Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/415088?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "type": "apk", "namespace": "alpine", "name": "webkit2gtk", "version": "2.20.4-r0", "qualifiers": { "arch": "x86_64", "distroversion": "v3.8", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60957?format=api", "vulnerability_id": "VCID-5hp2-sn84-d7be", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74685", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74679", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74681", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74601", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74673", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4273", "reference_id": "CVE-2018-4273", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4273" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4273" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hp2-sn84-d7be" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60955?format=api", "vulnerability_id": "VCID-5tuw-ektv-wyas", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4270", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74685", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74679", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74681", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74554", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7463", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.7461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74601", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74639", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00834", "scoring_system": "epss", "scoring_elements": "0.74673", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4270" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4270", "reference_id": "CVE-2018-4270", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4270" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4270" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5tuw-ektv-wyas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60959?format=api", "vulnerability_id": "VCID-6np5-hgxp-bke7", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4284", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71272", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71283", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71142", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71152", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71144", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71199", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71192", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71238", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71245", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71223", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71276", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4284" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4284", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4284" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4284", "reference_id": "CVE-2018-4284", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4284" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4284" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6np5-hgxp-bke7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60950?format=api", "vulnerability_id": "VCID-8ub3-sxwy-9kf3", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4263", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68047", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68059", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4263" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4263" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4263", "reference_id": "CVE-2018-4263", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4263" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4263" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ub3-sxwy-9kf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60953?format=api", "vulnerability_id": "VCID-b8dt-24xv-hya8", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4266", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73262", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73269", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73267", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73122", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73164", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73202", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73219", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73221", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00752", "scoring_system": "epss", "scoring_elements": "0.73256", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4266" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4266", "reference_id": "CVE-2018-4266", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4266" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4266" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8dt-24xv-hya8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60958?format=api", "vulnerability_id": "VCID-d3r2-7hz3-x3e5", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70952", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70971", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70969", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.7083", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70882", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.7089", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70875", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70921", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70927", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70907", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00652", "scoring_system": "epss", "scoring_elements": "0.70961", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4278" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/146479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208932" }, { "reference_url": "https://support.apple.com/HT208933%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208933%2C" }, { "reference_url": "https://support.apple.com/HT208934%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208934%2C" }, { "reference_url": "https://support.apple.com/HT208936%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208936%2C" }, { "reference_url": "https://support.apple.com/HT208938%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208938%2C" }, { "reference_url": "http://www.securitytracker.com/id/1041232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4278", "reference_id": "CVE-2018-4278", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4278" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4278" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3r2-7hz3-x3e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60954?format=api", "vulnerability_id": "VCID-gq5t-85tk-9qgh", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4267", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68047", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68059", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4267" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4267" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4267", "reference_id": "CVE-2018-4267", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4267" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4267" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gq5t-85tk-9qgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60952?format=api", "vulnerability_id": "VCID-jqga-zt57-u3f2", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72541", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72552", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.7255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.7242", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72454", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72489", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72462", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72503", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72502", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00719", "scoring_system": "epss", "scoring_elements": "0.72545", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4265" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4265", "reference_id": "CVE-2018-4265", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4265" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4265" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqga-zt57-u3f2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60956?format=api", "vulnerability_id": "VCID-my5m-zqa9-xyef", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75091", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7508", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75083", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7496", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75047", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75075", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4272" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4272", "reference_id": "CVE-2018-4272", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4272" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my5m-zqa9-xyef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60951?format=api", "vulnerability_id": "VCID-p8yr-rvxc-5yek", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75091", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7508", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75083", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.7496", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.74967", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75014", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75047", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00859", "scoring_system": "epss", "scoring_elements": "0.75075", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4264" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4264", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4264" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208935" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4264", "reference_id": "CVE-2018-4264", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4264" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4264" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p8yr-rvxc-5yek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60949?format=api", "vulnerability_id": "VCID-phdn-6ruj-2bcq", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4262", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7437", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74374", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74373", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74249", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74253", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7428", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.743", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74321", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74294", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74331", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.7434", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74332", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00816", "scoring_system": "epss", "scoring_elements": "0.74366", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4262" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4262", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4262" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208934%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208934%2C" }, { "reference_url": "https://support.apple.com/HT208935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208935" }, { "reference_url": "https://support.apple.com/HT208938%2C", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208938%2C" }, { "reference_url": "http://www.securitytracker.com/id/1041232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041232" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4262", "reference_id": "CVE-2018-4262", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4262" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4262" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-phdn-6ruj-2bcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93730?format=api", "vulnerability_id": "VCID-qhj3-qxpm-8kgh", "summary": "An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages type confusion.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4246", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90122", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90113", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90111", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90042", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90054", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90059", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90074", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90079", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90088", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.9008", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90098", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05358", "scoring_system": "epss", "scoring_elements": "0.90095", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4246" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4246", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4246" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/HT208848", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208848" }, { "reference_url": "https://support.apple.com/HT208850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208850" }, { "reference_url": "https://support.apple.com/HT208851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208851" }, { "reference_url": "https://support.apple.com/HT208852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208852" }, { "reference_url": "https://support.apple.com/HT208853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208853" }, { "reference_url": "https://support.apple.com/HT208854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT208854" }, { "reference_url": "http://www.securitytracker.com/id/1041029", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041029" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4246", "reference_id": "CVE-2018-4246", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4246" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4246" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhj3-qxpm-8kgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93521?format=api", "vulnerability_id": "VCID-r32v-5wbh-ffbz", "summary": "WebKitGTK+ 2.20.3 has an off-by-one error, with a resultant out-of-bounds write, in the get_simple_globs functions in ThirdParty/xdgmime/src/xdgmimecache.c and ThirdParty/xdgmime/src/xdgmimeglob.c.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6578", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65808", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65662", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65711", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65707", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6576", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65771", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65792", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65798", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12911" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://trac.webkit.org/changeset/233404/webkit", "reference_id": "", "reference_type": "", "scores": [], "url": "https://trac.webkit.org/changeset/233404/webkit" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\\+:2.20.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12911", "reference_id": "CVE-2018-12911", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12911" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-12911" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r32v-5wbh-ffbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60948?format=api", "vulnerability_id": "VCID-x6av-365z-nfa9", "summary": "Multiple vulnerabilities have been found in WebKitGTK+, the worst\n of which may lead to arbitrary code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68047", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68068", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68073", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67944", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67995", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68009", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.67984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68034", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00551", "scoring_system": "epss", "scoring_elements": "0.68059", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-4261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4261" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/kb/HT208932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208932" }, { "reference_url": "https://support.apple.com/kb/HT208933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208933" }, { "reference_url": "https://support.apple.com/kb/HT208934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208934" }, { "reference_url": "https://support.apple.com/kb/HT208936", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208936" }, { "reference_url": "https://support.apple.com/kb/HT208938", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/kb/HT208938" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4261", "reference_id": "CVE-2018-4261", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4261" }, { "reference_url": "https://security.gentoo.org/glsa/201808-04", "reference_id": "GLSA-201808-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201808-04" }, { "reference_url": "https://usn.ubuntu.com/3743-1/", "reference_id": "USN-3743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/415088?format=api", "purl": "pkg:apk/alpine/webkit2gtk@2.20.4-r0?arch=x86_64&distroversion=v3.8&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" } ], "aliases": [ "CVE-2018-4261" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6av-365z-nfa9" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/webkit2gtk@2.20.4-r0%3Farch=x86_64&distroversion=v3.8&reponame=community" }