The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade webkitgtk
to version 2.48.7 or higher.
Affected versions of this package are vulnerable to Use After Free via the memory management
process. An attacker can execute arbitrary code or cause a crash by tricking a user into processing or loading malicious web content. This is only exploitable if the system has specific packages installed and is used via a graphical interface to process untrusted web content, such as through GNOME. In certain configurations, exploitation may be possible from the local network without user interaction.
**
This vulnerability can be mitigated by not processing or loading untrusted web content, or by removing packages that require the affected component. Removing some packages may also remove GNOME and other dependent packages, affecting system functionality. WebKitGTK3 can be removed without breaking functionality.