Search for vulnerabilities
Vulnerability details: VCID-u6n1-8qgn-aaar
Vulnerability ID VCID-u6n1-8qgn-aaar
Aliases CVE-2018-16428
Summary In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
Status Published
Exploitability 0.5
Weighted Severity 8.8
Risk 4.4
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16428.html
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16428.json
epss 0.01112 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01112 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01134 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01845 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01845 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01845 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.01845 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.02272 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
epss 0.03115 https://api.first.org/data/v1/epss?cve=CVE-2018-16428
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=1626145
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
cvssv3 4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
generic_textual Medium https://gitlab.gnome.org/GNOME/glib/issues/1364
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-16428
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-16428
generic_textual Medium https://ubuntu.com/security/notices/USN-3767-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3767-2
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-16428.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16428.json
https://api.first.org/data/v1/epss?cve=CVE-2018-16428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://gitlab.gnome.org/GNOME/glib/commit/fccef3cc822af74699cca84cd202719ae61ca3b9
https://gitlab.gnome.org/GNOME/glib/issues/1364
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://ubuntu.com/security/notices/USN-3767-1
https://ubuntu.com/security/notices/USN-3767-2
https://usn.ubuntu.com/3767-1/
https://usn.ubuntu.com/3767-2/
http://www.openwall.com/lists/oss-security/2020/02/14/3
http://www.securityfocus.com/bid/105210
1626145 https://bugzilla.redhat.com/show_bug.cgi?id=1626145
cpe:2.3:a:gnome:glib:2.56.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.56.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
CVE-2018-16428 https://nvd.nist.gov/vuln/detail/CVE-2018-16428
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16428.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-16428
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-16428
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.77152
EPSS Score 0.01112
Published At June 20, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.