{"api_version":"1","generated_at":"2026-04-22T19:34:54+00:00","cve":"CVE-2019-6251","urls":{"html":"https://cve.report/CVE-2019-6251","api":"https://cve.report/api/cve/CVE-2019-6251.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-6251","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-6251"},"summary":{"title":"CVE-2019-6251","description":"WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-01-14 08:29:00","updated_at":"2023-11-07 03:13:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://gitlab.gnome.org/GNOME/epiphany/issues/532","name":"https://gitlab.gnome.org/GNOME/epiphany/issues/532","refsource":"MISC","tags":["Exploit","Patch","Third Party Advisory"],"title":"(CVE-2018-8383/CVE-2019-6251) Address bar spoofing (#532) · Issues · GNOME / Epiphany · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/","name":"FEDORA-2019-b3ad0a302b","refsource":"","tags":[],"title":"[SECURITY] Fedora 29 Update: webkit2gtk3-2.24.1-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html","name":"openSUSE-SU-2019:1374","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2019:1374-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/","name":"FEDORA-2019-432b3dff25","refsource":"","tags":[],"title":"[SECURITY] Fedora 28 Update: webkit2gtk3-2.24.1-1.fc28 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/3948-1/","name":"USN-3948-1","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-3948-1: WebKitGTK+ vulnerabilities | Ubuntu security notices","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/","name":"FEDORA-2019-74f7603660","refsource":"","tags":[],"title":"[SECURITY] Fedora 29 Update: wpewebkit-2.24.1-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/","name":"FEDORA-2019-d9a15be3ba","refsource":"FEDORA","tags":["Mailing List","Release Notes","Third Party Advisory"],"title":"[SECURITY] Fedora 30 Update: webkit2gtk3-2.24.1-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.webkit.org/show_bug.cgi?id=194208","name":"https://bugs.webkit.org/show_bug.cgi?id=194208","refsource":"MISC","tags":["Issue Tracking","Vendor Advisory"],"title":"194208 – (CVE-2019-6251) [WPE][GTK] URI spoofing when JS redirects page to something that takes a long time to load","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/","name":"FEDORA-2019-77433fc7f3","refsource":"","tags":[],"title":"[SECURITY] Fedora 30 Update: wpewebkit-2.24.1-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html","name":"openSUSE-SU-2019:1391","refsource":"SUSE","tags":["Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2019:1391-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/","name":"FEDORA-2019-74f7603660","refsource":"FEDORA","tags":["Mailing List","Release Notes","Third Party Advisory"],"title":"[SECURITY] Fedora 29 Update: wpewebkit-2.24.1-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/","name":"FEDORA-2019-b3ad0a302b","refsource":"FEDORA","tags":["Mailing List","Release Notes","Third Party Advisory"],"title":"[SECURITY] Fedora 29 Update: webkit2gtk3-2.24.1-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/","name":"FEDORA-2019-432b3dff25","refsource":"FEDORA","tags":["Mailing List","Release Notes","Third Party Advisory"],"title":"[SECURITY] Fedora 28 Update: webkit2gtk3-2.24.1-1.fc28 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://trac.webkit.org/changeset/243434","name":"https://trac.webkit.org/changeset/243434","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"Changeset 243434 – WebKit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html","name":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html","refsource":"MISC","tags":["Third Party Advisory","VDB Entry"],"title":"WebKitGTK+ / WPE WebKit URI Spoofing / Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/","name":"FEDORA-2019-d9a15be3ba","refsource":"","tags":[],"title":"[SECURITY] Fedora 30 Update: webkit2gtk3-2.24.1-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/","name":"FEDORA-2019-77433fc7f3","refsource":"FEDORA","tags":["Mailing List","Release Notes","Third Party Advisory"],"title":"[SECURITY] Fedora 30 Update: wpewebkit-2.24.1-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/bugtraq/2019/Apr/21","name":"20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","refsource":"BUGTRAQ","tags":["Mailing List","Third Party Advisory"],"title":"Bugtraq: WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2019/04/11/1","name":"[oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201909-05","name":"GLSA-201909-05","refsource":"GENTOO","tags":[],"title":"WebkitGTK+: Multiple vulnerabilities (GLSA 201909-05) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-6251","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6251","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"28","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"29","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"28","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"29","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"30","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"3.31.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnome","cpe5":"epiphany","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"42.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"42.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webkitgtk","cpe5":"webkitgtk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"webkitgtk","cpe5":"webkitgtk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wpewebkit","cpe5":"wpe_webkit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"6251","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"wpewebkit","cpe5":"wpe_webkit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-6251","qid":"296078","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 16.4.0 Missing (CPUOCT2019)"},{"cve":"CVE-2019-6251","qid":"377553","title":"Alibaba Cloud Linux Security Update for webkitgtk4 (ALINUX2-SA-2020:0147)"},{"cve":"CVE-2019-6251","qid":"501282","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2019-6251","qid":"505503","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2019-6251","qid":"670910","title":"EulerOS Security Update for webkitgtk3 (EulerOS-SA-2021-1130)"},{"cve":"CVE-2019-6251","qid":"671110","title":"EulerOS Security Update for webkitgtk3 (EulerOS-SA-2019-2196)"},{"cve":"CVE-2019-6251","qid":"671119","title":"EulerOS Security Update for webkitgtk4 (EulerOS-SA-2019-2197)"},{"cve":"CVE-2019-6251","qid":"710127","title":"Gentoo Linux WebkitGTK+ Multiple vulnerabilities (GLSA 201909-05)"},{"cve":"CVE-2019-6251","qid":"940366","title":"AlmaLinux Security Update for GNOME (ALSA-2019:3553)"},{"cve":"CVE-2019-6251","qid":"960235","title":"Rocky Linux Security Update for GNOME (RLSA-2019:3553)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-6251","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://gitlab.gnome.org/GNOME/epiphany/issues/532","refsource":"MISC","url":"https://gitlab.gnome.org/GNOME/epiphany/issues/532"},{"refsource":"BUGTRAQ","name":"20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","url":"https://seclists.org/bugtraq/2019/Apr/21"},{"refsource":"MLIST","name":"[oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002","url":"http://www.openwall.com/lists/oss-security/2019/04/11/1"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html","url":"http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html"},{"refsource":"FEDORA","name":"FEDORA-2019-d9a15be3ba","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YO5ZBUWOOXMVZPBYLZRDZF6ZQGBYJERQ/"},{"refsource":"FEDORA","name":"FEDORA-2019-b3ad0a302b","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPI3R6QWDJBA5KNGA6QSMKYLY5RRHBZ/"},{"refsource":"UBUNTU","name":"USN-3948-1","url":"https://usn.ubuntu.com/3948-1/"},{"refsource":"MISC","name":"https://bugs.webkit.org/show_bug.cgi?id=194208","url":"https://bugs.webkit.org/show_bug.cgi?id=194208"},{"refsource":"MISC","name":"https://trac.webkit.org/changeset/243434","url":"https://trac.webkit.org/changeset/243434"},{"refsource":"FEDORA","name":"FEDORA-2019-432b3dff25","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LACVFU4MYYRPJ3IEA4UCN5KUEAGCCJ72/"},{"refsource":"FEDORA","name":"FEDORA-2019-77433fc7f3","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UO3DIA54X7FOUWFZW5YXC2MZ6KNHG6SW/"},{"refsource":"FEDORA","name":"FEDORA-2019-74f7603660","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSCDI3635E37GL4BNJDRDT2KEUBDLGSO/"},{"refsource":"SUSE","name":"openSUSE-SU-2019:1374","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html"},{"refsource":"SUSE","name":"openSUSE-SU-2019:1391","url":"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html"},{"refsource":"GENTOO","name":"GLSA-201909-05","url":"https://security.gentoo.org/glsa/201909-05"}]}},"nvd":{"publishedDate":"2019-01-14 08:29:00","lastModifiedDate":"2023-11-07 03:13:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnome:epiphany:*:*:*:*:*:*:*:*","versionEndIncluding":"3.31.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*","versionEndExcluding":"2.24.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*","versionEndExcluding":"2.24.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"6251","Ordinal":"143927","Title":"CVE-2019-6251","CVE":"CVE-2019-6251","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"6251","Ordinal":"1","NoteData":"WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"6251","Ordinal":"2","NoteData":"2019-01-14","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"6251","Ordinal":"3","NoteData":"2019-09-06","Type":"Other","Title":"Modified"}]}}}