Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-6jyz-wpj3-6kfr
Vulnerability ID VCID-6jyz-wpj3-6kfr
Aliases CVE-2019-8820
Summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to arbitrary code execution.
Status Published
Exploitability 2.0
Weighted Severity 7.9
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8820.json
https://api.first.org/data/v1/epss?cve=CVE-2019-8820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1876591 https://bugzilla.redhat.com/show_bug.cgi?id=1876591
CVE-2019-8820 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1924
CVE-2019-8820 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47590.txt
GLSA-202003-22 https://security.gentoo.org/glsa/202003-22
RHSA-2020:4035 https://access.redhat.com/errata/RHSA-2020:4035
RHSA-2020:4451 https://access.redhat.com/errata/RHSA-2020:4451
Data source Exploit-DB
Date added Nov. 5, 2019
Description JavaScriptCore - Type Confusion During Bailout when Reconstructing Arguments Objects
Ransomware campaign use Known
Source publication date Nov. 5, 2019
Exploit type dos
Platform multiple
Source update date Nov. 5, 2019
Source URL https://bugs.chromium.org/p/project-zero/issues/detail?id=1924
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8820.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.91073
EPSS Score 0.06533
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:02:25.945218+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/202003-22 38.0.0