Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/410873?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "type": "apk", "namespace": "alpine", "name": "webkit2gtk", "version": "2.24.1-r0", "qualifiers": { "arch": "x86_64", "distroversion": "v3.10", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.24.2-r0", "latest_non_vulnerable_version": "2.26.2-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33807?format=api", "vulnerability_id": "VCID-244h-dfjr-affw", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8524.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8524.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8524", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74653", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74659", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74674", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74697", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74676", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74668", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74705", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74713", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74704", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.7474", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00838", "scoring_system": "epss", "scoring_elements": "0.74749", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719209", "reference_id": "1719209", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719209" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8524" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-244h-dfjr-affw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33797?format=api", "vulnerability_id": "VCID-3ejm-7bb5-ebfh", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11070.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83181", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83323", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83285", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83309", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83316", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.8321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83283", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01904", "scoring_system": "epss", "scoring_elements": "0.83284", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11070" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=193718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=193718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Apr/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Apr/21" }, { "reference_url": "https://trac.webkit.org/changeset/243197/webkit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/243197/webkit" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/04/11/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709289", "reference_id": "1709289", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709289" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11070", "reference_id": "CVE-2019-11070", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11070" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-11070" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ejm-7bb5-ebfh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33810?format=api", "vulnerability_id": "VCID-6ufb-fw7y-6ybf", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8544.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8544.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8544", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81383", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81409", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81453", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81454", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81455", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81484", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81489", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719224", "reference_id": "1719224", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719224" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8544" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufb-fw7y-6ybf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33811?format=api", "vulnerability_id": "VCID-6vsc-9aez-kqe7", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67775", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67746", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67713", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67748", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67761", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67762", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00543", "scoring_system": "epss", "scoring_elements": "0.67772", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70753", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70674", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.7067", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00647", "scoring_system": "epss", "scoring_elements": "0.70731", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719238", "reference_id": "1719238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719238" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8551" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vsc-9aez-kqe7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33812?format=api", "vulnerability_id": "VCID-arqg-dzcf-vfby", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94578", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94608", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94628", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94631", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94636", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94637", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.15256", "scoring_system": "epss", "scoring_elements": "0.94638", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719231", "reference_id": "1719231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719231" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1783", "reference_id": "CVE-2019-8558", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1783" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46650.js", "reference_id": "CVE-2019-8558", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46650.js" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8558" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arqg-dzcf-vfby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33808?format=api", "vulnerability_id": "VCID-eefe-ax79-xyfa", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84203", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84221", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84222", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84251", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.8426", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02137", "scoring_system": "epss", "scoring_elements": "0.84264", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719210", "reference_id": "1719210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719210" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8535" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eefe-ax79-xyfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33803?format=api", "vulnerability_id": "VCID-h1tw-vmek-73b6", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8506.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92104", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92111", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92145", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92117", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.9214", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92147", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92144", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08064", "scoring_system": "epss", "scoring_elements": "0.92148", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8506" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719199", "reference_id": "1719199", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719199" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1753", "reference_id": "CVE-2019-8506", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1753" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46647.js", "reference_id": "CVE-2019-8506", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/46647.js" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://support.apple.com/HT209599", "reference_id": "HT209599", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209599" }, { "reference_url": "https://support.apple.com/HT209601", "reference_id": "HT209601", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209601" }, { "reference_url": "https://support.apple.com/HT209602", "reference_id": "HT209602", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209602" }, { "reference_url": "https://support.apple.com/HT209603", "reference_id": "HT209603", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209603" }, { "reference_url": "https://support.apple.com/HT209604", "reference_id": "HT209604", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209604" }, { "reference_url": "https://support.apple.com/HT209605", "reference_id": "HT209605", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:41:25Z/" } ], "url": "https://support.apple.com/HT209605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8506" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h1tw-vmek-73b6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33815?format=api", "vulnerability_id": "VCID-p185-6wtn-tbc2", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8563.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74409", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719237", "reference_id": "1719237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719237" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8563" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p185-6wtn-tbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33809?format=api", "vulnerability_id": "VCID-wbba-68wb-z7bs", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8536.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80843", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.8087", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80879", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80895", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80873", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80912", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80913", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80934", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80941", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01464", "scoring_system": "epss", "scoring_elements": "0.80953", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719213", "reference_id": "1719213", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719213" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8536" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbba-68wb-z7bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33814?format=api", "vulnerability_id": "VCID-ws98-vxe9-1fhq", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8559.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74317", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74323", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74359", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74367", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74402", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74411", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74409", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-8559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719235", "reference_id": "1719235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719235" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-8559" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ws98-vxe9-1fhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33799?format=api", "vulnerability_id": "VCID-zwdq-utma-yqaf", "summary": "Multiple vulnerabilities have been found in WebkitGTK+, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" }, { "reference_url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6251.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6251.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6251", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85123", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85245", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85216", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85247", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85197", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85194", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02448", "scoring_system": "epss", "scoring_elements": "0.85215", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-6251" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=194208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=194208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" }, { "reference_url": "https://gitlab.gnome.org/GNOME/epiphany/issues/532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gitlab.gnome.org/GNOME/epiphany/issues/532" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Apr/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Apr/21" }, { "reference_url": "https://trac.webkit.org/changeset/243434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/243434" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/11/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/04/11/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667409", "reference_id": "1667409", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667409" }, { "reference_url": "https://security.archlinux.org/AVG-851", "reference_id": "AVG-851", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-851" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6251", "reference_id": "CVE-2019-6251", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6251" }, { "reference_url": "https://security.gentoo.org/glsa/201909-05", "reference_id": "GLSA-201909-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201909-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3553", "reference_id": "RHSA-2019:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4035", "reference_id": "RHSA-2020:4035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4035" }, { "reference_url": "https://usn.ubuntu.com/3948-1/", "reference_id": "USN-3948-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3948-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/410873?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.24.1-r0?arch=x86_64&distroversion=v3.10&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" } ], "aliases": [ "CVE-2019-6251" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zwdq-utma-yqaf" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.24.1-r0%3Farch=x86_64&distroversion=v3.10&reponame=community" }