Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/librsvg2@2.40.20-1?arch=el7
Typerpm
Namespaceredhat
Namelibrsvg2
Version2.40.20-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-13hw-kece-pyf7
vulnerability_id VCID-13hw-kece-pyf7
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4200.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4200
reference_id
reference_type
scores
0
value 0.35682
scoring_system epss
scoring_elements 0.97042
published_at 2026-04-01T12:55:00Z
1
value 0.35682
scoring_system epss
scoring_elements 0.97053
published_at 2026-04-04T12:55:00Z
2
value 0.35682
scoring_system epss
scoring_elements 0.97049
published_at 2026-04-02T12:55:00Z
3
value 0.37285
scoring_system epss
scoring_elements 0.97156
published_at 2026-04-07T12:55:00Z
4
value 0.37285
scoring_system epss
scoring_elements 0.97165
published_at 2026-04-08T12:55:00Z
5
value 0.37285
scoring_system epss
scoring_elements 0.97171
published_at 2026-04-12T12:55:00Z
6
value 0.37285
scoring_system epss
scoring_elements 0.97166
published_at 2026-04-09T12:55:00Z
7
value 0.40022
scoring_system epss
scoring_elements 0.9733
published_at 2026-04-13T12:55:00Z
8
value 0.40022
scoring_system epss
scoring_elements 0.97341
published_at 2026-04-18T12:55:00Z
9
value 0.40022
scoring_system epss
scoring_elements 0.97339
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4200
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4200
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/HT208741
reference_id
reference_type
scores
url https://support.apple.com/HT208741
5
reference_url https://support.apple.com/HT208743
reference_id
reference_type
scores
url https://support.apple.com/HT208743
6
reference_url https://support.apple.com/HT208850
reference_id
reference_type
scores
url https://support.apple.com/HT208850
7
reference_url https://support.apple.com/HT208852
reference_id
reference_type
scores
url https://support.apple.com/HT208852
8
reference_url https://support.apple.com/HT208853
reference_id
reference_type
scores
url https://support.apple.com/HT208853
9
reference_url https://www.exploit-db.com/exploits/44566/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44566/
10
reference_url http://www.securityfocus.com/bid/103961
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103961
11
reference_url http://www.securitytracker.com/id/1040743
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040743
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1577385
reference_id 1577385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1577385
13
reference_url https://security.archlinux.org/ASA-201805-9
reference_id ASA-201805-9
reference_type
scores
url https://security.archlinux.org/ASA-201805-9
14
reference_url https://security.archlinux.org/AVG-692
reference_id AVG-692
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-692
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
24
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1525
reference_id CVE-2018-4200
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1525
25
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html
reference_id CVE-2018-4200
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44566.html
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4200
reference_id CVE-2018-4200
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-4200
27
reference_url https://security.gentoo.org/glsa/201808-04
reference_id GLSA-201808-04
reference_type
scores
url https://security.gentoo.org/glsa/201808-04
28
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
29
reference_url https://usn.ubuntu.com/3640-1/
reference_id USN-3640-1
reference_type
scores
url https://usn.ubuntu.com/3640-1/
fixed_packages
aliases CVE-2018-4200
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-13hw-kece-pyf7
1
url VCID-1u61-d4ch-eya4
vulnerability_id VCID-1u61-d4ch-eya4
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4204
reference_id
reference_type
scores
0
value 0.0348
scoring_system epss
scoring_elements 0.87524
published_at 2026-04-02T12:55:00Z
1
value 0.0348
scoring_system epss
scoring_elements 0.87514
published_at 2026-04-01T12:55:00Z
2
value 0.0348
scoring_system epss
scoring_elements 0.87537
published_at 2026-04-04T12:55:00Z
3
value 0.03746
scoring_system epss
scoring_elements 0.88032
published_at 2026-04-18T12:55:00Z
4
value 0.03746
scoring_system epss
scoring_elements 0.8802
published_at 2026-04-12T12:55:00Z
5
value 0.03746
scoring_system epss
scoring_elements 0.88021
published_at 2026-04-13T12:55:00Z
6
value 0.03746
scoring_system epss
scoring_elements 0.88034
published_at 2026-04-16T12:55:00Z
7
value 0.03746
scoring_system epss
scoring_elements 0.8799
published_at 2026-04-07T12:55:00Z
8
value 0.03746
scoring_system epss
scoring_elements 0.8801
published_at 2026-04-08T12:55:00Z
9
value 0.03746
scoring_system epss
scoring_elements 0.88017
published_at 2026-04-09T12:55:00Z
10
value 0.03746
scoring_system epss
scoring_elements 0.88028
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/HT208741
reference_id
reference_type
scores
url https://support.apple.com/HT208741
5
reference_url https://support.apple.com/HT208743
reference_id
reference_type
scores
url https://support.apple.com/HT208743
6
reference_url https://support.apple.com/HT208848
reference_id
reference_type
scores
url https://support.apple.com/HT208848
7
reference_url https://support.apple.com/HT208850
reference_id
reference_type
scores
url https://support.apple.com/HT208850
8
reference_url https://support.apple.com/HT208852
reference_id
reference_type
scores
url https://support.apple.com/HT208852
9
reference_url https://support.apple.com/HT208853
reference_id
reference_type
scores
url https://support.apple.com/HT208853
10
reference_url http://www.securityfocus.com/bid/103961
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103961
11
reference_url http://www.securitytracker.com/id/1040743
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040743
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1577374
reference_id 1577374
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1577374
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-4204
reference_id CVE-2018-4204
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-4204
20
reference_url https://security.gentoo.org/glsa/201808-04
reference_id GLSA-201808-04
reference_type
scores
url https://security.gentoo.org/glsa/201808-04
21
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
fixed_packages
aliases CVE-2018-4204
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1u61-d4ch-eya4
2
url VCID-29b3-s5n9-5fd8
vulnerability_id VCID-29b3-s5n9-5fd8
summary poppler: out of bounds read in pdfunite
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-13988
reference_id
reference_type
scores
0
value 0.00645
scoring_system epss
scoring_elements 0.70726
published_at 2026-04-18T12:55:00Z
1
value 0.00645
scoring_system epss
scoring_elements 0.70674
published_at 2026-04-13T12:55:00Z
2
value 0.00645
scoring_system epss
scoring_elements 0.70719
published_at 2026-04-16T12:55:00Z
3
value 0.00841
scoring_system epss
scoring_elements 0.74684
published_at 2026-04-02T12:55:00Z
4
value 0.00841
scoring_system epss
scoring_elements 0.74685
published_at 2026-04-07T12:55:00Z
5
value 0.00841
scoring_system epss
scoring_elements 0.74717
published_at 2026-04-08T12:55:00Z
6
value 0.00841
scoring_system epss
scoring_elements 0.74731
published_at 2026-04-09T12:55:00Z
7
value 0.00841
scoring_system epss
scoring_elements 0.74755
published_at 2026-04-11T12:55:00Z
8
value 0.00841
scoring_system epss
scoring_elements 0.74734
published_at 2026-04-12T12:55:00Z
9
value 0.00841
scoring_system epss
scoring_elements 0.74681
published_at 2026-04-01T12:55:00Z
10
value 0.00841
scoring_system epss
scoring_elements 0.7471
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-13988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602838
reference_id 1602838
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602838
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922
reference_id 904922
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904922
6
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
7
reference_url https://usn.ubuntu.com/3757-1/
reference_id USN-3757-1
reference_type
scores
url https://usn.ubuntu.com/3757-1/
fixed_packages
aliases CVE-2018-13988
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29b3-s5n9-5fd8
3
url VCID-9vuw-57ex-k7ez
vulnerability_id VCID-9vuw-57ex-k7ez
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
1
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
2
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12910.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12910
reference_id
reference_type
scores
0
value 0.04219
scoring_system epss
scoring_elements 0.88775
published_at 2026-04-18T12:55:00Z
1
value 0.04219
scoring_system epss
scoring_elements 0.88764
published_at 2026-04-13T12:55:00Z
2
value 0.04219
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-16T12:55:00Z
3
value 0.07838
scoring_system epss
scoring_elements 0.91953
published_at 2026-04-01T12:55:00Z
4
value 0.07838
scoring_system epss
scoring_elements 0.91961
published_at 2026-04-02T12:55:00Z
5
value 0.07838
scoring_system epss
scoring_elements 0.91969
published_at 2026-04-04T12:55:00Z
6
value 0.07838
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-07T12:55:00Z
7
value 0.07838
scoring_system epss
scoring_elements 0.91988
published_at 2026-04-08T12:55:00Z
8
value 0.07838
scoring_system epss
scoring_elements 0.91991
published_at 2026-04-09T12:55:00Z
9
value 0.07838
scoring_system epss
scoring_elements 0.91994
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12910
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
8
reference_url https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
9
reference_url https://gitlab.gnome.org/GNOME/libsoup/issues/3
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/libsoup/issues/3
10
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
12
reference_url https://www.debian.org/security/2018/dsa-4241
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4241
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1597980
reference_id 1597980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1597980
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:2.63.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12910
reference_id CVE-2018-12910
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12910
28
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
29
reference_url https://usn.ubuntu.com/3701-1/
reference_id USN-3701-1
reference_type
scores
url https://usn.ubuntu.com/3701-1/
fixed_packages
aliases CVE-2018-12910
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vuw-57ex-k7ez
4
url VCID-kre4-9v6u-3ked
vulnerability_id VCID-kre4-9v6u-3ked
summary poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10768.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10768
reference_id
reference_type
scores
0
value 0.01853
scoring_system epss
scoring_elements 0.82945
published_at 2026-04-01T12:55:00Z
1
value 0.01853
scoring_system epss
scoring_elements 0.83046
published_at 2026-04-18T12:55:00Z
2
value 0.01853
scoring_system epss
scoring_elements 0.83012
published_at 2026-04-12T12:55:00Z
3
value 0.01853
scoring_system epss
scoring_elements 0.83008
published_at 2026-04-13T12:55:00Z
4
value 0.01853
scoring_system epss
scoring_elements 0.83047
published_at 2026-04-16T12:55:00Z
5
value 0.01853
scoring_system epss
scoring_elements 0.82961
published_at 2026-04-02T12:55:00Z
6
value 0.01853
scoring_system epss
scoring_elements 0.82974
published_at 2026-04-04T12:55:00Z
7
value 0.01853
scoring_system epss
scoring_elements 0.82971
published_at 2026-04-07T12:55:00Z
8
value 0.01853
scoring_system epss
scoring_elements 0.82996
published_at 2026-04-08T12:55:00Z
9
value 0.01853
scoring_system epss
scoring_elements 0.83003
published_at 2026-04-09T12:55:00Z
10
value 0.01853
scoring_system epss
scoring_elements 0.83019
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10768
4
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=106408
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=106408
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576169
reference_id 1576169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576169
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10768
reference_id CVE-2018-10768
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10768
17
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
18
reference_url https://usn.ubuntu.com/3647-1/
reference_id USN-3647-1
reference_type
scores
url https://usn.ubuntu.com/3647-1/
fixed_packages
aliases CVE-2018-10768
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kre4-9v6u-3ked
5
url VCID-p9ht-pahu-wbea
vulnerability_id VCID-p9ht-pahu-wbea
summary accountsservice: insufficient path check in user_change_icon_file_authorized_cb() in user.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14036.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14036
reference_id
reference_type
scores
0
value 0.01239
scoring_system epss
scoring_elements 0.79188
published_at 2026-04-01T12:55:00Z
1
value 0.01239
scoring_system epss
scoring_elements 0.79257
published_at 2026-04-18T12:55:00Z
2
value 0.01239
scoring_system epss
scoring_elements 0.7926
published_at 2026-04-16T12:55:00Z
3
value 0.01239
scoring_system epss
scoring_elements 0.79245
published_at 2026-04-12T12:55:00Z
4
value 0.01239
scoring_system epss
scoring_elements 0.79233
published_at 2026-04-13T12:55:00Z
5
value 0.01239
scoring_system epss
scoring_elements 0.79195
published_at 2026-04-02T12:55:00Z
6
value 0.01239
scoring_system epss
scoring_elements 0.79218
published_at 2026-04-04T12:55:00Z
7
value 0.01239
scoring_system epss
scoring_elements 0.79203
published_at 2026-04-07T12:55:00Z
8
value 0.01239
scoring_system epss
scoring_elements 0.79229
published_at 2026-04-08T12:55:00Z
9
value 0.01239
scoring_system epss
scoring_elements 0.79236
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14036
2
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=107085
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=107085
3
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1099699
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1099699
4
reference_url https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a
reference_id
reference_type
scores
url https://cgit.freedesktop.org/accountsservice/commit/?id=f9abd359f71a5bce421b9ae23432f539a067847a
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14036
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2018/07/02/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2018/07/02/2
8
reference_url http://www.securityfocus.com/bid/104757
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104757
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1601019
reference_id 1601019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1601019
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903828
reference_id 903828
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903828
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:accountsservice:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14036
reference_id CVE-2018-14036
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-14036
13
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
14
reference_url https://usn.ubuntu.com/4616-1/
reference_id USN-4616-1
reference_type
scores
url https://usn.ubuntu.com/4616-1/
15
reference_url https://usn.ubuntu.com/4616-2/
reference_id USN-4616-2
reference_type
scores
url https://usn.ubuntu.com/4616-2/
fixed_packages
aliases CVE-2018-14036
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9ht-pahu-wbea
6
url VCID-qjj9-dejh-vuaq
vulnerability_id VCID-qjj9-dejh-vuaq
summary poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18267.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18267
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50793
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50935
published_at 2026-04-18T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50929
published_at 2026-04-16T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-12T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50891
published_at 2026-04-13T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50848
published_at 2026-04-02T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50874
published_at 2026-04-04T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50832
published_at 2026-04-07T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50889
published_at 2026-04-08T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50887
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18267
4
reference_url https://bugzilla.freedesktop.org/show_bug.cgi?id=103238
reference_id
reference_type
scores
url https://bugzilla.freedesktop.org/show_bug.cgi?id=103238
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
8
reference_url https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1578777
reference_id 1578777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1578777
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357
reference_id 898357
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898357
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18267
reference_id CVE-2017-18267
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18267
22
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
23
reference_url https://usn.ubuntu.com/3647-1/
reference_id USN-3647-1
reference_type
scores
url https://usn.ubuntu.com/3647-1/
fixed_packages
aliases CVE-2017-18267
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjj9-dejh-vuaq
7
url VCID-qws2-p3ru-cbfw
vulnerability_id VCID-qws2-p3ru-cbfw
summary libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html
1
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
2
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10733.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10733.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10733
reference_id
reference_type
scores
0
value 0.00799
scoring_system epss
scoring_elements 0.73978
published_at 2026-04-01T12:55:00Z
1
value 0.00799
scoring_system epss
scoring_elements 0.74074
published_at 2026-04-18T12:55:00Z
2
value 0.00799
scoring_system epss
scoring_elements 0.74033
published_at 2026-04-12T12:55:00Z
3
value 0.00799
scoring_system epss
scoring_elements 0.74026
published_at 2026-04-13T12:55:00Z
4
value 0.00799
scoring_system epss
scoring_elements 0.74065
published_at 2026-04-16T12:55:00Z
5
value 0.00799
scoring_system epss
scoring_elements 0.73984
published_at 2026-04-02T12:55:00Z
6
value 0.00799
scoring_system epss
scoring_elements 0.74011
published_at 2026-04-04T12:55:00Z
7
value 0.00799
scoring_system epss
scoring_elements 0.73982
published_at 2026-04-07T12:55:00Z
8
value 0.00799
scoring_system epss
scoring_elements 0.74016
published_at 2026-04-08T12:55:00Z
9
value 0.00799
scoring_system epss
scoring_elements 0.74029
published_at 2026-04-09T12:55:00Z
10
value 0.00799
scoring_system epss
scoring_elements 0.74052
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10733
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1574844
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1574844
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576111
reference_id 1576111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576111
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897954
reference_id 897954
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=897954
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10733
reference_id CVE-2018-10733
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10733
17
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
fixed_packages
aliases CVE-2018-10733
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qws2-p3ru-cbfw
8
url VCID-tsw4-kqbc-kqf1
vulnerability_id VCID-tsw4-kqbc-kqf1
summary freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.722
published_at 2026-04-01T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72294
published_at 2026-04-18T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72256
published_at 2026-04-12T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-13T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72285
published_at 2026-04-16T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72205
published_at 2026-04-02T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72225
published_at 2026-04-04T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-07T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-08T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-09T12:55:00Z
10
value 0.00711
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45955
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45955
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
reference_id 1752788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
reference_id CVE-2015-9381
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
aliases CVE-2015-9381
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1
9
url VCID-v9s7-7by8-dyeg
vulnerability_id VCID-v9s7-7by8-dyeg
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11712
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44113
published_at 2026-04-01T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44221
published_at 2026-04-18T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44203
published_at 2026-04-11T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.4417
published_at 2026-04-13T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44232
published_at 2026-04-16T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44177
published_at 2026-04-02T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.442
published_at 2026-04-04T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44132
published_at 2026-04-07T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44183
published_at 2026-04-08T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.44187
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11712
2
reference_url https://bugs.webkit.org/show_bug.cgi?id=184804
reference_id
reference_type
scores
url https://bugs.webkit.org/show_bug.cgi?id=184804
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11712
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://trac.webkit.org/changeset/230886/webkit
reference_id
reference_type
scores
url https://trac.webkit.org/changeset/230886/webkit
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1588742
reference_id 1588742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1588742
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\+:2.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:webkitgtk:webkitgtk\+:2.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\+:2.20.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\+:2.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:webkitgtk:webkitgtk\+:2.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\+:2.20.1:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11712
reference_id CVE-2018-11712
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-11712
10
reference_url https://security.gentoo.org/glsa/201808-04
reference_id GLSA-201808-04
reference_type
scores
url https://security.gentoo.org/glsa/201808-04
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
fixed_packages
aliases CVE-2018-11712
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9s7-7by8-dyeg
10
url VCID-vvu1-fbux-z7bn
vulnerability_id VCID-vvu1-fbux-z7bn
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11713
reference_id
reference_type
scores
0
value 0.00551
scoring_system epss
scoring_elements 0.67915
published_at 2026-04-01T12:55:00Z
1
value 0.00551
scoring_system epss
scoring_elements 0.68026
published_at 2026-04-18T12:55:00Z
2
value 0.00551
scoring_system epss
scoring_elements 0.6801
published_at 2026-04-12T12:55:00Z
3
value 0.00551
scoring_system epss
scoring_elements 0.67976
published_at 2026-04-13T12:55:00Z
4
value 0.00551
scoring_system epss
scoring_elements 0.68013
published_at 2026-04-16T12:55:00Z
5
value 0.00551
scoring_system epss
scoring_elements 0.67938
published_at 2026-04-02T12:55:00Z
6
value 0.00551
scoring_system epss
scoring_elements 0.67957
published_at 2026-04-04T12:55:00Z
7
value 0.00551
scoring_system epss
scoring_elements 0.67936
published_at 2026-04-07T12:55:00Z
8
value 0.00551
scoring_system epss
scoring_elements 0.67987
published_at 2026-04-08T12:55:00Z
9
value 0.00551
scoring_system epss
scoring_elements 0.68001
published_at 2026-04-09T12:55:00Z
10
value 0.00551
scoring_system epss
scoring_elements 0.68024
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11713
2
reference_url https://bugs.webkit.org/show_bug.cgi?id=126384
reference_id
reference_type
scores
url https://bugs.webkit.org/show_bug.cgi?id=126384
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11713
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://trac.webkit.org/changeset/228088/webkit
reference_id
reference_type
scores
url https://trac.webkit.org/changeset/228088/webkit
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1588739
reference_id 1588739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1588739
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11713
reference_id CVE-2018-11713
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-11713
10
reference_url https://security.gentoo.org/glsa/201808-04
reference_id GLSA-201808-04
reference_type
scores
url https://security.gentoo.org/glsa/201808-04
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
fixed_packages
aliases CVE-2018-11713
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvu1-fbux-z7bn
11
url VCID-x1zs-swgf-efd6
vulnerability_id VCID-x1zs-swgf-efd6
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-4121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-4121
reference_id
reference_type
scores
0
value 0.3861
scoring_system epss
scoring_elements 0.97218
published_at 2026-04-01T12:55:00Z
1
value 0.3861
scoring_system epss
scoring_elements 0.97223
published_at 2026-04-02T12:55:00Z
2
value 0.3861
scoring_system epss
scoring_elements 0.97229
published_at 2026-04-04T12:55:00Z
3
value 0.3861
scoring_system epss
scoring_elements 0.9723
published_at 2026-04-07T12:55:00Z
4
value 0.3861
scoring_system epss
scoring_elements 0.9724
published_at 2026-04-08T12:55:00Z
5
value 0.3861
scoring_system epss
scoring_elements 0.97241
published_at 2026-04-09T12:55:00Z
6
value 0.3861
scoring_system epss
scoring_elements 0.97244
published_at 2026-04-11T12:55:00Z
7
value 0.3861
scoring_system epss
scoring_elements 0.97245
published_at 2026-04-12T12:55:00Z
8
value 0.3861
scoring_system epss
scoring_elements 0.97246
published_at 2026-04-13T12:55:00Z
9
value 0.3861
scoring_system epss
scoring_elements 0.97254
published_at 2026-04-16T12:55:00Z
10
value 0.3861
scoring_system epss
scoring_elements 0.97256
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-4121
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4121
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1577387
reference_id 1577387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1577387
5
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1522
reference_id CVE-2018-4121
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1522
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt
reference_id CVE-2018-4121
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/44427.txt
7
reference_url https://security.gentoo.org/glsa/201808-04
reference_id GLSA-201808-04
reference_type
scores
url https://security.gentoo.org/glsa/201808-04
8
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
fixed_packages
aliases CVE-2018-4121
risk_score 9.0
exploitability 2.0
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1zs-swgf-efd6
12
url VCID-xddg-3n6n-t7gk
vulnerability_id VCID-xddg-3n6n-t7gk
summary libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3505
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10767.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10767.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10767
reference_id
reference_type
scores
0
value 0.00854
scoring_system epss
scoring_elements 0.74898
published_at 2026-04-01T12:55:00Z
1
value 0.00854
scoring_system epss
scoring_elements 0.74982
published_at 2026-04-18T12:55:00Z
2
value 0.00854
scoring_system epss
scoring_elements 0.74948
published_at 2026-04-12T12:55:00Z
3
value 0.00854
scoring_system epss
scoring_elements 0.74939
published_at 2026-04-13T12:55:00Z
4
value 0.00854
scoring_system epss
scoring_elements 0.74976
published_at 2026-04-16T12:55:00Z
5
value 0.00854
scoring_system epss
scoring_elements 0.74899
published_at 2026-04-02T12:55:00Z
6
value 0.00854
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-04T12:55:00Z
7
value 0.00854
scoring_system epss
scoring_elements 0.74901
published_at 2026-04-07T12:55:00Z
8
value 0.00854
scoring_system epss
scoring_elements 0.74935
published_at 2026-04-08T12:55:00Z
9
value 0.00854
scoring_system epss
scoring_elements 0.74947
published_at 2026-04-09T12:55:00Z
10
value 0.00854
scoring_system epss
scoring_elements 0.7497
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10767
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575188
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575188
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576175
reference_id 1576175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576175
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898133
reference_id 898133
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898133
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:libgxps:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10767
reference_id CVE-2018-10767
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10767
15
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
fixed_packages
aliases CVE-2018-10767
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xddg-3n6n-t7gk
13
url VCID-y1sm-7uec-1bc5
vulnerability_id VCID-y1sm-7uec-1bc5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2862
reference_id
reference_type
scores
0
value 0.05689
scoring_system epss
scoring_elements 0.90362
published_at 2026-04-01T12:55:00Z
1
value 0.05689
scoring_system epss
scoring_elements 0.90417
published_at 2026-04-18T12:55:00Z
2
value 0.05689
scoring_system epss
scoring_elements 0.90402
published_at 2026-04-13T12:55:00Z
3
value 0.05689
scoring_system epss
scoring_elements 0.90418
published_at 2026-04-16T12:55:00Z
4
value 0.05689
scoring_system epss
scoring_elements 0.90364
published_at 2026-04-02T12:55:00Z
5
value 0.05689
scoring_system epss
scoring_elements 0.90376
published_at 2026-04-04T12:55:00Z
6
value 0.05689
scoring_system epss
scoring_elements 0.90381
published_at 2026-04-07T12:55:00Z
7
value 0.05689
scoring_system epss
scoring_elements 0.90394
published_at 2026-04-08T12:55:00Z
8
value 0.05689
scoring_system epss
scoring_elements 0.90401
published_at 2026-04-09T12:55:00Z
9
value 0.05689
scoring_system epss
scoring_elements 0.90409
published_at 2026-04-11T12:55:00Z
10
value 0.05689
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488817
reference_id 1488817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552
reference_id 874552
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552
6
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
7
reference_url https://usn.ubuntu.com/3418-1/
reference_id USN-3418-1
reference_type
scores
url https://usn.ubuntu.com/3418-1/
fixed_packages
aliases CVE-2017-2862
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1sm-7uec-1bc5
14
url VCID-ysfs-xxjz-vbep
vulnerability_id VCID-ysfs-xxjz-vbep
summary freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
reference_id
reference_type
scores
0
value 0.00798
scoring_system epss
scoring_elements 0.73965
published_at 2026-04-01T12:55:00Z
1
value 0.00798
scoring_system epss
scoring_elements 0.74063
published_at 2026-04-18T12:55:00Z
2
value 0.00798
scoring_system epss
scoring_elements 0.74021
published_at 2026-04-12T12:55:00Z
3
value 0.00798
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-13T12:55:00Z
4
value 0.00798
scoring_system epss
scoring_elements 0.74054
published_at 2026-04-16T12:55:00Z
5
value 0.00798
scoring_system epss
scoring_elements 0.73972
published_at 2026-04-02T12:55:00Z
6
value 0.00798
scoring_system epss
scoring_elements 0.73998
published_at 2026-04-04T12:55:00Z
7
value 0.00798
scoring_system epss
scoring_elements 0.73969
published_at 2026-04-07T12:55:00Z
8
value 0.00798
scoring_system epss
scoring_elements 0.74003
published_at 2026-04-08T12:55:00Z
9
value 0.00798
scoring_system epss
scoring_elements 0.74017
published_at 2026-04-09T12:55:00Z
10
value 0.00798
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45922
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45922
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
reference_id 1763609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
reference_id CVE-2015-9382
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
aliases CVE-2015-9382
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/librsvg2@2.40.20-1%3Farch=el7