Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
Typeapk
Namespacealpine
Namewebkit2gtk
Version2.28.3-r0
Qualifiers
arch s390x
distroversion v3.16
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.28.4-r0
Latest_non_vulnerable_version2.36.5-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3ed7-5bwx-5fd3
vulnerability_id VCID-3ed7-5bwx-5fd3
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9803.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9803
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48945
published_at 2026-04-01T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49008
published_at 2026-04-13T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.49028
published_at 2026-04-11T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49001
published_at 2026-04-12T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48981
published_at 2026-04-02T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49007
published_at 2026-04-04T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48961
published_at 2026-04-07T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49015
published_at 2026-04-08T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49011
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9803
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879557
reference_id 1879557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879557
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9803
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ed7-5bwx-5fd3
1
url VCID-67jq-85hp-hkez
vulnerability_id VCID-67jq-85hp-hkez
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9807.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9807
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45618
published_at 2026-04-01T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45706
published_at 2026-04-13T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45727
published_at 2026-04-11T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45697
published_at 2026-04-12T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45685
published_at 2026-04-02T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45704
published_at 2026-04-09T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45652
published_at 2026-04-07T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45708
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879564
reference_id 1879564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879564
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9807
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67jq-85hp-hkez
2
url VCID-82hd-28j1-xyev
vulnerability_id VCID-82hd-28j1-xyev
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9805.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9805
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-01T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75135
published_at 2026-04-12T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.75136
published_at 2026-04-09T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75157
published_at 2026-04-11T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.75083
published_at 2026-04-02T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.75112
published_at 2026-04-04T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75089
published_at 2026-04-07T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.75124
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9805
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879559
reference_id 1879559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879559
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82hd-28j1-xyev
3
url VCID-ckrd-x24d-cyav
vulnerability_id VCID-ckrd-x24d-cyav
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9952.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9952
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66163
published_at 2026-04-01T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-13T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66281
published_at 2026-04-11T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-12T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66204
published_at 2026-04-02T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66231
published_at 2026-04-04T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.662
published_at 2026-04-07T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66248
published_at 2026-04-08T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.66261
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901219
reference_id 1901219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901219
11
reference_url https://security.archlinux.org/AVG-1292
reference_id AVG-1292
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1292
12
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
13
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9952
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckrd-x24d-cyav
4
url VCID-qzm6-yqm1-abdh
vulnerability_id VCID-qzm6-yqm1-abdh
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9806.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9806
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.71365
published_at 2026-04-07T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71408
published_at 2026-04-13T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71441
published_at 2026-04-11T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71426
published_at 2026-04-12T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71373
published_at 2026-04-02T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71391
published_at 2026-04-04T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71406
published_at 2026-04-08T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71419
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879563
reference_id 1879563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879563
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9806
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm6-yqm1-abdh
5
url VCID-r27p-urrj-ckac
vulnerability_id VCID-r27p-urrj-ckac
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13753.json
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13753
reference_id
reference_type
scores
0
value 0.01219
scoring_system epss
scoring_elements 0.7901
published_at 2026-04-01T12:55:00Z
1
value 0.01219
scoring_system epss
scoring_elements 0.79057
published_at 2026-04-13T12:55:00Z
2
value 0.01219
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-11T12:55:00Z
3
value 0.01219
scoring_system epss
scoring_elements 0.79067
published_at 2026-04-12T12:55:00Z
4
value 0.01219
scoring_system epss
scoring_elements 0.79016
published_at 2026-04-02T12:55:00Z
5
value 0.01219
scoring_system epss
scoring_elements 0.79042
published_at 2026-04-04T12:55:00Z
6
value 0.01219
scoring_system epss
scoring_elements 0.79027
published_at 2026-04-07T12:55:00Z
7
value 0.01219
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-08T12:55:00Z
8
value 0.01219
scoring_system epss
scoring_elements 0.79058
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879570
reference_id 1879570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879570
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
17
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-13753
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r27p-urrj-ckac
6
url VCID-sf71-zb7h-xycs
vulnerability_id VCID-sf71-zb7h-xycs
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9802.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9802
reference_id
reference_type
scores
0
value 0.41488
scoring_system epss
scoring_elements 0.97381
published_at 2026-04-01T12:55:00Z
1
value 0.41488
scoring_system epss
scoring_elements 0.97405
published_at 2026-04-13T12:55:00Z
2
value 0.41488
scoring_system epss
scoring_elements 0.97387
published_at 2026-04-02T12:55:00Z
3
value 0.41488
scoring_system epss
scoring_elements 0.97392
published_at 2026-04-04T12:55:00Z
4
value 0.41488
scoring_system epss
scoring_elements 0.97394
published_at 2026-04-07T12:55:00Z
5
value 0.41488
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-09T12:55:00Z
6
value 0.41488
scoring_system epss
scoring_elements 0.97403
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879545
reference_id 1879545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879545
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://support.apple.com/HT211168
reference_id HT211168
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211168
16
reference_url https://support.apple.com/HT211171
reference_id HT211171
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211171
17
reference_url https://support.apple.com/HT211175
reference_id HT211175
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211175
18
reference_url https://support.apple.com/HT211177
reference_id HT211177
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211177
19
reference_url https://support.apple.com/HT211178
reference_id HT211178
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211178
20
reference_url https://support.apple.com/HT211179
reference_id HT211179
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211179
21
reference_url https://support.apple.com/HT211181
reference_id HT211181
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211181
22
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9802
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sf71-zb7h-xycs
7
url VCID-vh6x-1uak-6bh4
vulnerability_id VCID-vh6x-1uak-6bh4
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9843.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9843
reference_id
reference_type
scores
0
value 0.00708
scoring_system epss
scoring_elements 0.72147
published_at 2026-04-01T12:55:00Z
1
value 0.00708
scoring_system epss
scoring_elements 0.72193
published_at 2026-04-13T12:55:00Z
2
value 0.00708
scoring_system epss
scoring_elements 0.72222
published_at 2026-04-11T12:55:00Z
3
value 0.00708
scoring_system epss
scoring_elements 0.72206
published_at 2026-04-12T12:55:00Z
4
value 0.00708
scoring_system epss
scoring_elements 0.72153
published_at 2026-04-02T12:55:00Z
5
value 0.00708
scoring_system epss
scoring_elements 0.72173
published_at 2026-04-04T12:55:00Z
6
value 0.00708
scoring_system epss
scoring_elements 0.72151
published_at 2026-04-07T12:55:00Z
7
value 0.00708
scoring_system epss
scoring_elements 0.72187
published_at 2026-04-08T12:55:00Z
8
value 0.00708
scoring_system epss
scoring_elements 0.72199
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879566
reference_id 1879566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879566
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9843
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6x-1uak-6bh4
8
url VCID-y4mh-xhvx-yubd
vulnerability_id VCID-y4mh-xhvx-yubd
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9850.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9850.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9850
reference_id
reference_type
scores
0
value 0.82826
scoring_system epss
scoring_elements 0.99236
published_at 2026-04-01T12:55:00Z
1
value 0.82826
scoring_system epss
scoring_elements 0.99247
published_at 2026-04-12T12:55:00Z
2
value 0.82826
scoring_system epss
scoring_elements 0.99245
published_at 2026-04-08T12:55:00Z
3
value 0.82826
scoring_system epss
scoring_elements 0.99246
published_at 2026-04-13T12:55:00Z
4
value 0.82826
scoring_system epss
scoring_elements 0.99238
published_at 2026-04-02T12:55:00Z
5
value 0.82826
scoring_system epss
scoring_elements 0.9924
published_at 2026-04-04T12:55:00Z
6
value 0.82826
scoring_system epss
scoring_elements 0.99244
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9850
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879568
reference_id 1879568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879568
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
0
url pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/webkit2gtk@2.28.3-r0?arch=s390x&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community
aliases CVE-2020-9850
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4mh-xhvx-yubd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.28.3-r0%3Farch=s390x&distroversion=v3.16&reponame=community