Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-rnz6-454a-pqb4
Vulnerability ID VCID-rnz6-454a-pqb4
Aliases CVE-2019-8690
Summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
Status Published
Exploitability 2.0
Weighted Severity 5.5
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8690.json
https://api.first.org/data/v1/epss?cve=CVE-2019-8690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1876664 https://bugzilla.redhat.com/show_bug.cgi?id=1876664
CVE-2019-8690 Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1880
CVE-2019-8690 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/47237.txt
GLSA-201909-05 https://security.gentoo.org/glsa/201909-05
RHSA-2019:3553 https://access.redhat.com/errata/RHSA-2019:3553
RHSA-2020:4035 https://access.redhat.com/errata/RHSA-2020:4035
USN-4130-1 https://usn.ubuntu.com/4130-1/
Data source Exploit-DB
Date added Aug. 12, 2019
Description WebKit - UXSS via XSLT and Nested Document Replacements
Ransomware campaign use Known
Source publication date Aug. 12, 2019
Exploit type dos
Platform multiple
Source update date Aug. 12, 2019
Source URL https://bugs.chromium.org/p/project-zero/issues/detail?id=1880
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-8690.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.92127
EPSS Score 0.08113
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:00:31.025238+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201909-05 38.0.0