Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/84519?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "type": "ebuild", "namespace": "net-libs", "name": "webkit-gtk", "version": "2.28.2", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.28.3", "latest_non_vulnerable_version": "4.38.00", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59313?format=api", "vulnerability_id": "VCID-1wkj-3u5c-93cm", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3902.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3902.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74719", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74843", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74833", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.7484", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74722", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74749", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.7477", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74773", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74763", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74807", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876476", "reference_id": "1876476", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876476" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3902", "reference_id": "CVE-2020-3902", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3902" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3902" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wkj-3u5c-93cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59304?format=api", "vulnerability_id": "VCID-4egy-yrk3-aqfq", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11793.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11793.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11793", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7441", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74368", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829369", "reference_id": "1829369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1829369" }, { "reference_url": "https://security.archlinux.org/ASA-202004-17", "reference_id": "ASA-202004-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-17" }, { "reference_url": "https://security.archlinux.org/AVG-1137", "reference_id": "AVG-1137", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1137" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" }, { "reference_url": "https://usn.ubuntu.com/4331-1/", "reference_id": "USN-4331-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4331-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-11793" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4egy-yrk3-aqfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59306?format=api", "vulnerability_id": "VCID-5zcv-2pwv-pyb3", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3894.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3894.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70595", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70754", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70711", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.7069", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70608", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70602", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70647", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70663", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00644", "scoring_system": "epss", "scoring_elements": "0.70703", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876463", "reference_id": "1876463", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876463" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3894", "reference_id": "CVE-2020-3894", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" }, { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3894" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3894" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zcv-2pwv-pyb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59303?format=api", "vulnerability_id": "VCID-69zt-2pvg-uyc5", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10018.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10018.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10018", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.8578", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85746", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.8577", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85667", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85685", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85711", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85722", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.8573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85752", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811721", "reference_id": "1811721", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811721" }, { "reference_url": "https://security.archlinux.org/ASA-202003-9", "reference_id": "ASA-202003-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202003-9" }, { "reference_url": "https://security.archlinux.org/AVG-1114", "reference_id": "AVG-1114", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1114" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" }, { "reference_url": "https://usn.ubuntu.com/4310-1/", "reference_id": "USN-4310-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4310-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-10018" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69zt-2pvg-uyc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59310?format=api", "vulnerability_id": "VCID-97bz-hvxq-fqhb", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75432", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75567", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75523", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75559", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75564", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75435", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75467", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75447", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75518", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75497", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75487", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75529", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00888", "scoring_system": "epss", "scoring_elements": "0.75535", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211103" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876472", "reference_id": "1876472", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876472" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3900", "reference_id": "CVE-2020-3900", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3900" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3900" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-97bz-hvxq-fqhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59309?format=api", "vulnerability_id": "VCID-f4uc-z42n-u7b1", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3899.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3899.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87023", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87118", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87077", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87093", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87112", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87066", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87074", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87087", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03236", "scoring_system": "epss", "scoring_elements": "0.87082", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876470", "reference_id": "1876470", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876470" }, { "reference_url": "https://security.archlinux.org/ASA-202004-23", "reference_id": "ASA-202004-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-23" }, { "reference_url": "https://security.archlinux.org/AVG-1144", "reference_id": "AVG-1144", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1144" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3899", "reference_id": "CVE-2020-3899", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3899" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" }, { "reference_url": "https://usn.ubuntu.com/4347-1/", "reference_id": "USN-4347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4347-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3899" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4uc-z42n-u7b1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59307?format=api", "vulnerability_id": "VCID-ftqa-t89m-e3e6", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3895.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3895.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79691", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79668", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79675", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79608", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79629", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79613", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01284", "scoring_system": "epss", "scoring_elements": "0.79635", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211103" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876465", "reference_id": "1876465", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876465" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3895", "reference_id": "CVE-2020-3895", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3895" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3895" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftqa-t89m-e3e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59305?format=api", "vulnerability_id": "VCID-gpee-8uga-pbe4", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3885.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3885.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73542", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73677", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73636", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73669", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73678", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73551", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73545", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73581", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73595", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73617", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73599", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73591", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00774", "scoring_system": "epss", "scoring_elements": "0.73644", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876462", "reference_id": "1876462", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876462" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3885", "reference_id": "CVE-2020-3885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3885" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3885" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gpee-8uga-pbe4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59311?format=api", "vulnerability_id": "VCID-sr3u-wgqq-e3f5", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3901.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3901.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76342", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76484", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.7643", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76464", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76471", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76346", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76375", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76355", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76405", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.764", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76446", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211103" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876473", "reference_id": "1876473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876473" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3901", "reference_id": "CVE-2020-3901", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3901" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3901" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sr3u-wgqq-e3f5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59308?format=api", "vulnerability_id": "VCID-xqsb-hpef-nyaf", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3897.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-3897.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85243", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85363", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85333", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85355", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85364", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85273", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85275", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85297", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85305", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.8532", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85318", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85315", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85335", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85336", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT211101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211101" }, { "reference_url": "https://support.apple.com/HT211102", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211102" }, { "reference_url": "https://support.apple.com/HT211103", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211103" }, { "reference_url": "https://support.apple.com/HT211104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211104" }, { "reference_url": "https://support.apple.com/HT211105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211105" }, { "reference_url": "https://support.apple.com/HT211106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211106" }, { "reference_url": "https://support.apple.com/HT211107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT211107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876468", "reference_id": "1876468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876468" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3897", "reference_id": "CVE-2020-3897", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3897" }, { "reference_url": "https://security.gentoo.org/glsa/202006-08", "reference_id": "GLSA-202006-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202006-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4451", "reference_id": "RHSA-2020:4451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4451" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/84519?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.28.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" } ], "aliases": [ "CVE-2020-3897" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqsb-hpef-nyaf" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.28.2" }