Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-7s65-xuww-dffs
Vulnerability ID VCID-7s65-xuww-dffs
Aliases CVE-2018-4162
Summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to arbitrary code execution.
Status Published
Exploitability 2.0
Weighted Severity 3.8
Risk 7.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Metasploit
Description This module exploits a JIT optimization bug in Safari Webkit. This allows us to write shellcode to an RWX memory section in JavaScriptCore and execute it. The shellcode contains a kernel exploit (CVE-2016-4669) that obtains kernel rw, obtains root and disables code signing. Finally we download and execute the meterpreter payload. This module has been tested against iOS 7.1.2 on an iPhone 4.
Note
Stability:
  - crash-service-down
SideEffects: []
Reliability:
  - unreliable-session
Ransomware campaign use Unknown
Source publication date Aug. 25, 2016
Platform Apple_iOS
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/apple_ios/browser/safari_jit.rb
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.9724
EPSS Score 0.38907
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:12:31.142306+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201808-04 38.0.0