Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85492?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "type": "ebuild", "namespace": "net-libs", "name": "webkit-gtk", "version": "2.20.4", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.22.0", "latest_non_vulnerable_version": "4.38.00", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60940?format=api", "vulnerability_id": "VCID-13hw-kece-pyf7", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.35682", "scoring_system": "epss", "scoring_elements": "0.97049", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.35682", "scoring_system": "epss", "scoring_elements": "0.97042", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.35682", "scoring_system": "epss", "scoring_elements": "0.97053", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.37285", "scoring_system": "epss", "scoring_elements": "0.97156", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.37285", "scoring_system": "epss", "scoring_elements": "0.97165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.37285", "scoring_system": "epss", "scoring_elements": "0.97166", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.37285", "scoring_system": "epss", "scoring_elements": "0.97171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.40022", "scoring_system": "epss", "scoring_elements": "0.97339", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.40022", "scoring_system": "epss", "scoring_elements": "0.97341", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.40022", "scoring_system": "epss", "scoring_elements": "0.97342", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.40022", "scoring_system": "epss", "scoring_elements": "0.9733", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208741" }, { "reference_url": "https://support.apple.com/HT208743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208743" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://www.exploit-db.com/exploits/44566/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44566/" }, { "reference_url": "http://www.securityfocus.com/bid/103961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/103961" }, { "reference_url": "http://www.securitytracker.com/id/1040743", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1040743" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577385", "reference_id": "1577385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577385" }, { "reference_url": "https://security.archlinux.org/ASA-201805-9", "reference_id": "ASA-201805-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-9" }, { "reference_url": "https://security.archlinux.org/AVG-692", "reference_id": "AVG-692", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-692" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1525", "reference_id": "CVE-2018-4200", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1525" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html", "reference_id": "CVE-2018-4200", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4200", "reference_id": "CVE-2018-4200", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4200" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://usn.ubuntu.com/3640-1/", "reference_id": "USN-3640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3640-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4200" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13hw-kece-pyf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60942?format=api", "vulnerability_id": "VCID-1u61-d4ch-eya4", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0348", "scoring_system": "epss", "scoring_elements": "0.87524", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0348", "scoring_system": "epss", "scoring_elements": "0.87514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0348", "scoring_system": "epss", "scoring_elements": "0.87537", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.88032", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.8802", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.88021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.88034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.8799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.8801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.88017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03746", "scoring_system": "epss", "scoring_elements": "0.88028", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208741" }, { "reference_url": "https://support.apple.com/HT208743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208743" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "http://www.securityfocus.com/bid/103961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/103961" }, { "reference_url": "http://www.securitytracker.com/id/1040743", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1040743" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577374", "reference_id": "1577374", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577374" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4204", "reference_id": "CVE-2018-4204", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4204" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4204" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1u61-d4ch-eya4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60922?format=api", "vulnerability_id": "VCID-3sa5-d2u7-1qa4", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67597", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4114", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4114" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4114" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3sa5-d2u7-1qa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60919?format=api", "vulnerability_id": "VCID-5ey9-a99k-5qf7", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12294", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72308", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72311", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.7232", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72226", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72232", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72252", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72227", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72276", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00712", "scoring_system": "epss", "scoring_elements": "0.72269", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12294" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=184729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=184729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12294", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12294" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://trac.webkit.org/changeset/231300/webkit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/231300/webkit" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/14/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2018/06/14/1" }, { "reference_url": "http://www.securityfocus.com/archive/1/542087/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/542087/100/0/threaded" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkit:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkit:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkit:webkitgtk\\+:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12294", "reference_id": "CVE-2018-12294", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12294" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-12294" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ey9-a99k-5qf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60939?format=api", "vulnerability_id": "VCID-5fbn-ycgg-cqh3", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4199", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91468", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91467", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91399", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91405", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91434", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.9144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.9145", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06967", "scoring_system": "epss", "scoring_elements": "0.91472", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4199" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4199", "reference_id": "CVE-2018-4199", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4199" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4199" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fbn-ycgg-cqh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60957?format=api", "vulnerability_id": "VCID-5hp2-sn84-d7be", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74601", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4273", "reference_id": "CVE-2018-4273", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4273" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4273" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hp2-sn84-d7be" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60955?format=api", "vulnerability_id": "VCID-5tuw-ektv-wyas", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4270", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74601", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4270" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4270", "reference_id": "CVE-2018-4270", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4270" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4270" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5tuw-ektv-wyas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60959?format=api", "vulnerability_id": "VCID-6np5-hgxp-bke7", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4284", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71223", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71238", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71142", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71192", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4284" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4284", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4284" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4284", "reference_id": "CVE-2018-4284", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4284" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4284" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6np5-hgxp-bke7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60937?format=api", "vulnerability_id": "VCID-72cz-f7xr-pugn", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4190", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.86013", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.86021", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85963", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85962", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.86005", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.86003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.85998", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02751", "scoring_system": "epss", "scoring_elements": "0.86017", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4190" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4190", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4190" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4190", "reference_id": "CVE-2018-4190", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4190" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4190" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-72cz-f7xr-pugn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60923?format=api", "vulnerability_id": "VCID-77fq-ebnd-43fc", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4118" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4118" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-77fq-ebnd-43fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60934?format=api", "vulnerability_id": "VCID-7s65-xuww-dffs", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4162", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.9724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97245", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.9725", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97257", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97258", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97263", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97271", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38907", "scoring_system": "epss", "scoring_elements": "0.97273", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4162" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4162" ], "risk_score": 7.6, "exploitability": "2.0", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7s65-xuww-dffs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60947?format=api", "vulnerability_id": "VCID-8ax3-qacn-hyeg", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4233", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.9957", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99572", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99574", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99575", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.89897", "scoring_system": "epss", "scoring_elements": "0.99578", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4233" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4233", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4233" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://support.apple.com/HT208854" }, { "reference_url": "https://www.exploit-db.com/exploits/45998/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://www.exploit-db.com/exploits/45998/" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4233", "reference_id": "CVE-2018-4233", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4233" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/macos/remote/45998.rb", "reference_id": "CVE-2018-4404;CVE-2018-4233", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/macos/remote/45998.rb" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/cc7cb7302ef43478292f684f473fadb00f9b4344/modules/exploits/osx/browser/safari_proxy_object_type_confusion.rb", "reference_id": "CVE-2018-4404;CVE-2018-4233", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/cc7cb7302ef43478292f684f473fadb00f9b4344/modules/exploits/osx/browser/safari_proxy_object_type_confusion.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-03T13:13:53Z/" } ], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4233" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ax3-qacn-hyeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60918?format=api", "vulnerability_id": "VCID-8cdn-w1zm-k7dg", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/148200/WebKitGTK-Data-Leak-Code-Execution.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97284", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.9728", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97248", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97253", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.9726", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97266", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97267", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.9727", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38999", "scoring_system": "epss", "scoring_elements": "0.97272", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12293" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=186384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=186384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12293" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://trac.webkit.org/changeset/232618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/232618" }, { "reference_url": "https://www.exploit-db.com/exploits/45205/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/45205/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/14/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2018/06/14/1" }, { "reference_url": "http://www.securityfocus.com/archive/1/542087/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/542087/100/0/threaded" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45205.txt", "reference_id": "CVE-2018-12293", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45205.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12293", "reference_id": "CVE-2018-12293", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12293" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-12293" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cdn-w1zm-k7dg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60950?format=api", "vulnerability_id": "VCID-8ub3-sxwy-9kf3", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4263", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4263" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4263" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4263", "reference_id": "CVE-2018-4263", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4263" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4263" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ub3-sxwy-9kf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60924?format=api", "vulnerability_id": "VCID-9csv-aa9w-8yew", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4119" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4119" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9csv-aa9w-8yew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60946?format=api", "vulnerability_id": "VCID-9d5q-kqt7-cbc6", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4232", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89297", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89238", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89258", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89278", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89292", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04635", "scoring_system": "epss", "scoring_elements": "0.89288", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4232" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4232", "reference_id": "CVE-2018-4232", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4232" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4232" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9d5q-kqt7-cbc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60932?format=api", "vulnerability_id": "VCID-ap4t-dusm-tudf", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66023", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66011", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66022", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66036", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4133" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4133" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap4t-dusm-tudf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60928?format=api", "vulnerability_id": "VCID-apdc-ggqs-n7az", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67597", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4125" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4125" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apdc-ggqs-n7az" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60953?format=api", "vulnerability_id": "VCID-b8dt-24xv-hya8", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4266", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73221", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73219", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73122", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73164", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73176", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4266" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4266", "reference_id": "CVE-2018-4266", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4266" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4266" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8dt-24xv-hya8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60935?format=api", "vulnerability_id": "VCID-b8nf-zxdt-9kfn", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67597", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4163" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4163" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8nf-zxdt-9kfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60958?format=api", "vulnerability_id": "VCID-d3r2-7hz3-x3e5", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70907", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70921", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.7083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.7089", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70875", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4278" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208932" }, { "reference_url": "https://support.apple.com/HT208933%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208933%2C" }, { "reference_url": "https://support.apple.com/HT208934%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208934%2C" }, { "reference_url": "https://support.apple.com/HT208936%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208936%2C" }, { "reference_url": "https://support.apple.com/HT208938%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208938%2C" }, { "reference_url": "http://www.securitytracker.com/id/1041232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4278", "reference_id": "CVE-2018-4278", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4278" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4278" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3r2-7hz3-x3e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60943?format=api", "vulnerability_id": "VCID-d8ad-k3pa-r7gx", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91619", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91568", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91574", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91583", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91596", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91606", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07205", "scoring_system": "epss", "scoring_elements": "0.91608", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4214", "reference_id": "CVE-2018-4214", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4214" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4214" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8ad-k3pa-r7gx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60931?format=api", "vulnerability_id": "VCID-fas8-w78v-f7dn", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4129", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67597", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4129" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4129", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4129" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4129" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fas8-w78v-f7dn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39351?format=api", "vulnerability_id": "VCID-fu19-wgpf-x3by", "summary": "Multiple vulnerabilities have been found in Chromium and Google\n Chrome, the worst of which allows remote attackers to escalate privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4117.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4117.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4117", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76344", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76347", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76377", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76389", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76403", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76428", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76406", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76441", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00953", "scoring_system": "epss", "scoring_elements": "0.76432", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4117" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16064" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17460", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17460" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17461", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17461" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4117", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4117" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6154" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6161", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6168", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6170" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6172", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6172" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6173", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6173" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6175" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6177", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6178", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6178" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6179", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6179" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1608205", "reference_id": "1608205", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1608205" }, { "reference_url": "https://security.gentoo.org/glsa/201808-01", "reference_id": "GLSA-201808-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-01" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2282", "reference_id": "RHSA-2018:2282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2282" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4117" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fu19-wgpf-x3by" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60925?format=api", "vulnerability_id": "VCID-g63y-81hr-t7eh", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4120", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4120" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4120", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4120" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4120" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g63y-81hr-t7eh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60954?format=api", "vulnerability_id": "VCID-gq5t-85tk-9qgh", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4267", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4267" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4267" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4267", "reference_id": "CVE-2018-4267", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4267" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4267" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gq5t-85tk-9qgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60920?format=api", "vulnerability_id": "VCID-gzzw-rtvx-9kd8", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4101", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4101" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4101", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4101" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-942", "reference_id": "AVG-942", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-942" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4101" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gzzw-rtvx-9kd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60933?format=api", "vulnerability_id": "VCID-hvc8-p63r-4ffn", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74881", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74803", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74807", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.7484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74854", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74877", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74856", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74847", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00848", "scoring_system": "epss", "scoring_elements": "0.74891", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4146" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4146" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvc8-p63r-4ffn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60944?format=api", "vulnerability_id": "VCID-hwdz-wu72-n7dq", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.33972", "scoring_system": "epss", "scoring_elements": "0.96944", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.33972", "scoring_system": "epss", "scoring_elements": "0.96936", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.33972", "scoring_system": "epss", "scoring_elements": "0.96949", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97078", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.9706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.9707", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97074", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97054", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.35549", "scoring_system": "epss", "scoring_elements": "0.97059", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4218" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "https://www.exploit-db.com/exploits/44861/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44861/" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1553", "reference_id": "CVE-2018-4218", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1553" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44861.html", "reference_id": "CVE-2018-4218", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44861.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4218", "reference_id": "CVE-2018-4218", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4218" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4218" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwdz-wu72-n7dq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60936?format=api", "vulnerability_id": "VCID-j4qs-3dr1-5qc5", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4165", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4165" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4165" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4qs-3dr1-5qc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60952?format=api", "vulnerability_id": "VCID-jqga-zt57-u3f2", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72502", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72503", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.7242", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72454", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72489", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72462", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4265" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4265", "reference_id": "CVE-2018-4265", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4265" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4265" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqga-zt57-u3f2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60927?format=api", "vulnerability_id": "VCID-mqk1-vkj9-ckgp", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67472", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.6756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67573", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67597", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4122" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4122" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqk1-vkj9-ckgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60956?format=api", "vulnerability_id": "VCID-my5m-zqa9-xyef", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75047", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7496", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75003", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4272" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4272", "reference_id": "CVE-2018-4272", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4272" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my5m-zqa9-xyef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60929?format=api", "vulnerability_id": "VCID-ncbt-dp72-xfb1", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4127" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4127" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ncbt-dp72-xfb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60921?format=api", "vulnerability_id": "VCID-p8yq-7xjj-ayf9", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4113", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.7858", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78583", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78506", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78512", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78542", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78526", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78582", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78564", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78556", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01156", "scoring_system": "epss", "scoring_elements": "0.78584", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4113", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4113" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/AVG-942", "reference_id": "AVG-942", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-942" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4113" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8yq-7xjj-ayf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60951?format=api", "vulnerability_id": "VCID-p8yr-rvxc-5yek", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75047", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7496", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75003", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4264" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4264", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4264" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4264", "reference_id": "CVE-2018-4264", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4264" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4264" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8yr-rvxc-5yek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60949?format=api", "vulnerability_id": "VCID-phdn-6ruj-2bcq", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4262", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7434", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74253", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7428", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.743", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74321", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74294", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4262" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4262", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4262" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208934%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208934%2C" }, { "reference_url": "https://support.apple.com/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208935" }, { "reference_url": "https://support.apple.com/HT208938%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208938%2C" }, { "reference_url": "http://www.securitytracker.com/id/1041232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4262", "reference_id": "CVE-2018-4262", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4262" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4262" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-phdn-6ruj-2bcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60930?format=api", "vulnerability_id": "VCID-sqnp-xw53-wbh6", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4128", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67967", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67873", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67934", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00549", "scoring_system": "epss", "scoring_elements": "0.67985", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4128" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4128" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3635-1/", "reference_id": "USN-3635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3635-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4128" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqnp-xw53-wbh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60941?format=api", "vulnerability_id": "VCID-tcw6-87n4-f7gd", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03844", "scoring_system": "epss", "scoring_elements": "0.88135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03844", "scoring_system": "epss", "scoring_elements": "0.88127", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03844", "scoring_system": "epss", "scoring_elements": "0.88151", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88662", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88663", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88626", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88649", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88661", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04136", "scoring_system": "epss", "scoring_elements": "0.88654", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4201" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4201", "reference_id": "CVE-2018-4201", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4201" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4201" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcw6-87n4-f7gd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60915?format=api", "vulnerability_id": "VCID-tpqu-utfh-yqa5", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98894", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98888", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98877", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.9888", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98883", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98884", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98886", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.75346", "scoring_system": "epss", "scoring_elements": "0.98887", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11646" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=186164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=186164" }, { "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=795740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=795740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.exploit-db.com/exploits/44842/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44842/" }, { "reference_url": "https://www.exploit-db.com/exploits/44876/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44876/" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/44876.rb", "reference_id": "CVE-2018-11646", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/44876.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44842.txt", "reference_id": "CVE-2018-11646", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44842.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11646", "reference_id": "CVE-2018-11646", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11646" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-11646" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tpqu-utfh-yqa5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60916?format=api", "vulnerability_id": "VCID-v9s7-7by8-dyeg", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44113", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44151", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4417", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44232", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44221", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.442", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44183", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44187", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44203", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11712" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=184804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=184804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://trac.webkit.org/changeset/230886/webkit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/230886/webkit" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588742", "reference_id": "1588742", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588742" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11712", "reference_id": "CVE-2018-11712", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11712" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-11712" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9s7-7by8-dyeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60917?format=api", "vulnerability_id": "VCID-vvu1-fbux-z7bn", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67915", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68013", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67938", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67987", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.6801", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-11713" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=126384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=126384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://trac.webkit.org/changeset/228088/webkit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/228088/webkit" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588739", "reference_id": "1588739", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588739" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11713", "reference_id": "CVE-2018-11713", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11713" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-11713" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvu1-fbux-z7bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60945?format=api", "vulnerability_id": "VCID-wqw9-hh3j-4udm", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4222", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38164", "scoring_system": "epss", "scoring_elements": "0.972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38164", "scoring_system": "epss", "scoring_elements": "0.97193", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38164", "scoring_system": "epss", "scoring_elements": "0.97205", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.97331", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.9732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.97328", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.9733", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.97309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.97316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.97318", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.39794", "scoring_system": "epss", "scoring_elements": "0.97319", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4222" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4222" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "https://www.exploit-db.com/exploits/44859/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/44859/" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1545&desc=2", "reference_id": "CVE-2018-4222", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1545&desc=2" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44859.html", "reference_id": "CVE-2018-4222", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44859.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4222", "reference_id": "CVE-2018-4222", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4222" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3687-1/", "reference_id": "USN-3687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3687-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4222" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqw9-hh3j-4udm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60926?format=api", "vulnerability_id": "VCID-x1zs-swgf-efd6", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97218", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97223", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97229", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.9723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.9724", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97244", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97256", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.3861", "scoring_system": "epss", "scoring_elements": "0.97259", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577387", "reference_id": "1577387", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577387" }, { "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1522", "reference_id": "CVE-2018-4121", "reference_type": "exploit", "scores": [], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1522" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt", "reference_id": "CVE-2018-4121", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4121" ], "risk_score": 9.0, "exploitability": "2.0", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x1zs-swgf-efd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60948?format=api", "vulnerability_id": "VCID-x6av-365z-nfa9", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4261", "reference_id": "CVE-2018-4261", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4261" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4261" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6av-365z-nfa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60938?format=api", "vulnerability_id": "VCID-xpx9-nb83-bfg3", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.28934", "scoring_system": "epss", "scoring_elements": "0.96541", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.28934", "scoring_system": "epss", "scoring_elements": "0.96532", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.28934", "scoring_system": "epss", "scoring_elements": "0.96546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96705", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96709", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96691", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96693", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30409", "scoring_system": "epss", "scoring_elements": "0.96699", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4192" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "https://www.exploit-db.com/exploits/45048/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/45048/" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://gist.github.com/itszn/5e6354ff7975e65e5867f3a660e23e05", "reference_id": "CVE-2018-4192", "reference_type": "exploit", "scores": [], "url": "https://gist.github.com/itszn/5e6354ff7975e65e5867f3a660e23e05" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45048.js", "reference_id": "CVE-2018-4192", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/45048.js" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4192", "reference_id": "CVE-2018-4192", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4192" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85492?format=api", "purl": "pkg:ebuild/net-libs/webkit-gtk@2.20.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" } ], "aliases": [ "CVE-2018-4192" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpx9-nb83-bfg3" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.20.4" }