Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-mysql57-mysql@5.7.24-2?arch=el6
Typerpm
Namespaceredhat
Namerh-mysql57-mysql
Version5.7.24-2
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-15r5-nr1z-8bdv
vulnerability_id VCID-15r5-nr1z-8bdv
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3054.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3054.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3054
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-02T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61373
published_at 2026-04-21T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61224
published_at 2026-04-01T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61348
published_at 2026-04-08T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61363
published_at 2026-04-09T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61384
published_at 2026-04-11T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-12T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61351
published_at 2026-04-13T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61389
published_at 2026-04-16T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.61394
published_at 2026-04-18T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.61332
published_at 2026-04-04T12:55:00Z
11
value 0.0041
scoring_system epss
scoring_elements 0.613
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3054
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:29Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104769
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:29Z/
url http://www.securityfocus.com/bid/104769
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:29Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602354
reference_id 1602354
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602354
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3054
reference_id CVE-2018-3054
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3054
16
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:29Z/
url https://access.redhat.com/errata/RHSA-2018:3655
17
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:29Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3054
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15r5-nr1z-8bdv
1
url VCID-1nvb-xd5n-gkh8
vulnerability_id VCID-1nvb-xd5n-gkh8
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2755.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2755.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2755
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36702
published_at 2026-04-21T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36735
published_at 2026-04-13T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36779
published_at 2026-04-16T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36762
published_at 2026-04-18T12:55:00Z
4
value 0.00208
scoring_system epss
scoring_elements 0.43139
published_at 2026-04-02T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-01T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43157
published_at 2026-04-08T12:55:00Z
7
value 0.00208
scoring_system epss
scoring_elements 0.43104
published_at 2026-04-07T12:55:00Z
8
value 0.00208
scoring_system epss
scoring_elements 0.43166
published_at 2026-04-04T12:55:00Z
9
value 0.00208
scoring_system epss
scoring_elements 0.43158
published_at 2026-04-12T12:55:00Z
10
value 0.00208
scoring_system epss
scoring_elements 0.43191
published_at 2026-04-11T12:55:00Z
11
value 0.00208
scoring_system epss
scoring_elements 0.43169
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2755
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103807
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url http://www.securityfocus.com/bid/103807
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568921
reference_id 1568921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568921
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2755
reference_id CVE-2018-2755
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
1
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2755
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:29Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2755
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1nvb-xd5n-gkh8
2
url VCID-23h6-7bez-4bft
vulnerability_id VCID-23h6-7bez-4bft
summary mysql: Server: Connection unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2762.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2762
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.2894
published_at 2026-04-02T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28764
published_at 2026-04-21T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28863
published_at 2026-04-01T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28796
published_at 2026-04-07T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28864
published_at 2026-04-08T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28904
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.2891
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28817
published_at 2026-04-13T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28839
published_at 2026-04-16T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28815
published_at 2026-04-18T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.2899
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2762
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103794
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url http://www.securityfocus.com/bid/103794
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568925
reference_id 1568925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568925
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2762
reference_id CVE-2018-2762
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2762
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:59Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2762
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23h6-7bez-4bft
3
url VCID-23nu-t3h3-pyf8
vulnerability_id VCID-23nu-t3h3-pyf8
summary mysql: Server: Partition unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3161.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3161
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.58313
published_at 2026-04-02T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58355
published_at 2026-04-21T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58227
published_at 2026-04-01T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58383
published_at 2026-04-11T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58361
published_at 2026-04-12T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58342
published_at 2026-04-13T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58374
published_at 2026-04-16T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58378
published_at 2026-04-18T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58333
published_at 2026-04-04T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58307
published_at 2026-04-07T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.5836
published_at 2026-04-08T12:55:00Z
11
value 0.00362
scoring_system epss
scoring_elements 0.58366
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3161
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:44Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640319
reference_id 1640319
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640319
4
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:44Z/
url https://access.redhat.com/errata/RHSA-2018:3655
5
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:44Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3161
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23nu-t3h3-pyf8
4
url VCID-2b6g-wn3n-afg7
vulnerability_id VCID-2b6g-wn3n-afg7
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3143.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3143
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.49969
published_at 2026-04-21T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49916
published_at 2026-04-07T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49971
published_at 2026-04-08T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49963
published_at 2026-04-09T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49982
published_at 2026-04-11T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-12T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.4995
published_at 2026-04-13T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49995
published_at 2026-04-16T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49996
published_at 2026-04-18T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49939
published_at 2026-04-02T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49902
published_at 2026-04-01T12:55:00Z
11
value 0.00265
scoring_system epss
scoring_elements 0.49966
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3143
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url http://www.securityfocus.com/bid/105600
reference_id 105600
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:08Z/
url http://www.securityfocus.com/bid/105600
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640332
reference_id 1640332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640332
36
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:08Z/
url https://security.gentoo.org/glsa/201908-24
37
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:08Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
38
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:08Z/
url https://access.redhat.com/errata/RHSA-2018:3655
39
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:08Z/
url https://access.redhat.com/errata/RHSA-2019:1258
40
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:08Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3143
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b6g-wn3n-afg7
5
url VCID-2maq-jmhp-ebag
vulnerability_id VCID-2maq-jmhp-ebag
summary mysql: Server: Memcached unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3276.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3276.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3276
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31537
published_at 2026-04-02T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31389
published_at 2026-04-21T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31402
published_at 2026-04-01T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.3148
published_at 2026-04-09T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31484
published_at 2026-04-11T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31441
published_at 2026-04-12T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31404
published_at 2026-04-13T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31438
published_at 2026-04-16T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31417
published_at 2026-04-18T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.3158
published_at 2026-04-04T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31396
published_at 2026-04-07T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31449
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3276
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/105600
reference_id 105600
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:35Z/
url http://www.securityfocus.com/bid/105600
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640307
reference_id 1640307
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640307
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:35Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:35Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3276
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2maq-jmhp-ebag
6
url VCID-2t9k-k2d3-z7fd
vulnerability_id VCID-2t9k-k2d3-z7fd
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2766.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2766
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.39953
published_at 2026-04-21T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.39894
published_at 2026-04-01T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40041
published_at 2026-04-02T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40068
published_at 2026-04-04T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.39989
published_at 2026-04-07T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40042
published_at 2026-04-08T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40056
published_at 2026-04-09T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-11T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.4003
published_at 2026-04-12T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.4001
published_at 2026-04-13T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.4006
published_at 2026-04-16T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.40031
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2766
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
35
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
36
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://www.debian.org/security/2018/dsa-4341
37
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
38
reference_url http://www.securityfocus.com/bid/103805
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url http://www.securityfocus.com/bid/103805
39
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url http://www.securitytracker.com/id/1040698
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568926
reference_id 1568926
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568926
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2766
reference_id CVE-2018-2766
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2766
52
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://security.gentoo.org/glsa/201908-24
53
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://access.redhat.com/errata/RHSA-2018:1254
54
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://access.redhat.com/errata/RHSA-2018:3655
55
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://access.redhat.com/errata/RHSA-2019:1258
56
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://usn.ubuntu.com/3629-1/
57
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:08Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2766
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2t9k-k2d3-z7fd
7
url VCID-2twk-w9tn-eqcu
vulnerability_id VCID-2twk-w9tn-eqcu
summary mysql: Server: DML unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2839.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2839
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2839
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103845
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url http://www.securityfocus.com/bid/103845
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568957
reference_id 1568957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568957
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2839
reference_id CVE-2018-2839
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2839
19
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url https://access.redhat.com/errata/RHSA-2018:3655
20
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url https://usn.ubuntu.com/3629-1/
21
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:15Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2839
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2twk-w9tn-eqcu
8
url VCID-2uxe-ep8b-y7b9
vulnerability_id VCID-2uxe-ep8b-y7b9
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2781.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2781
reference_id
reference_type
scores
0
value 0.00144
scoring_system epss
scoring_elements 0.34781
published_at 2026-04-09T12:55:00Z
1
value 0.00144
scoring_system epss
scoring_elements 0.34752
published_at 2026-04-08T12:55:00Z
2
value 0.00144
scoring_system epss
scoring_elements 0.34746
published_at 2026-04-12T12:55:00Z
3
value 0.00144
scoring_system epss
scoring_elements 0.34708
published_at 2026-04-07T12:55:00Z
4
value 0.00144
scoring_system epss
scoring_elements 0.34833
published_at 2026-04-04T12:55:00Z
5
value 0.00144
scoring_system epss
scoring_elements 0.34785
published_at 2026-04-11T12:55:00Z
6
value 0.00144
scoring_system epss
scoring_elements 0.34593
published_at 2026-04-01T12:55:00Z
7
value 0.00144
scoring_system epss
scoring_elements 0.34806
published_at 2026-04-02T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.3549
published_at 2026-04-21T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35511
published_at 2026-04-13T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.3555
published_at 2026-04-16T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.3554
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103825
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url http://www.securityfocus.com/bid/103825
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568942
reference_id 1568942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568942
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2781
reference_id CVE-2018-2781
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2781
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:11Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2781
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uxe-ep8b-y7b9
9
url VCID-2yqz-qtv5-47hh
vulnerability_id VCID-2yqz-qtv5-47hh
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2818.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2818
reference_id
reference_type
scores
0
value 0.00984
scoring_system epss
scoring_elements 0.76848
published_at 2026-04-21T12:55:00Z
1
value 0.00984
scoring_system epss
scoring_elements 0.76751
published_at 2026-04-01T12:55:00Z
2
value 0.00984
scoring_system epss
scoring_elements 0.76755
published_at 2026-04-02T12:55:00Z
3
value 0.00984
scoring_system epss
scoring_elements 0.76784
published_at 2026-04-04T12:55:00Z
4
value 0.00984
scoring_system epss
scoring_elements 0.76764
published_at 2026-04-07T12:55:00Z
5
value 0.00984
scoring_system epss
scoring_elements 0.76796
published_at 2026-04-08T12:55:00Z
6
value 0.00984
scoring_system epss
scoring_elements 0.76806
published_at 2026-04-09T12:55:00Z
7
value 0.00984
scoring_system epss
scoring_elements 0.76835
published_at 2026-04-11T12:55:00Z
8
value 0.00984
scoring_system epss
scoring_elements 0.76815
published_at 2026-04-12T12:55:00Z
9
value 0.00984
scoring_system epss
scoring_elements 0.76808
published_at 2026-04-13T12:55:00Z
10
value 0.00984
scoring_system epss
scoring_elements 0.76851
published_at 2026-04-16T12:55:00Z
11
value 0.00984
scoring_system epss
scoring_elements 0.76856
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2818
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
13
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
14
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://www.debian.org/security/2018/dsa-4176
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
16
reference_url http://www.securityfocus.com/bid/103824
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url http://www.securityfocus.com/bid/103824
17
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url http://www.securitytracker.com/id/1040698
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568955
reference_id 1568955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568955
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2818
reference_id CVE-2018-2818
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2818
34
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://access.redhat.com/errata/RHSA-2018:1254
35
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://access.redhat.com/errata/RHSA-2018:3655
36
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://usn.ubuntu.com/3629-1/
37
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://usn.ubuntu.com/3629-2/
38
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:32Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2818
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yqz-qtv5-47hh
10
url VCID-3nbc-83rh-f7e6
vulnerability_id VCID-3nbc-83rh-f7e6
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3058.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3058
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36847
published_at 2026-04-21T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36843
published_at 2026-04-01T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.37001
published_at 2026-04-02T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.37035
published_at 2026-04-04T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.36863
published_at 2026-04-07T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36914
published_at 2026-04-08T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36929
published_at 2026-04-09T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36937
published_at 2026-04-11T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36902
published_at 2026-04-12T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36877
published_at 2026-04-13T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36922
published_at 2026-04-16T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36906
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3058
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
36
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
37
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
38
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://www.debian.org/security/2018/dsa-4341
39
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
40
reference_url http://www.securityfocus.com/bid/104766
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url http://www.securityfocus.com/bid/104766
41
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url http://www.securitytracker.com/id/1041294
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602356
reference_id 1602356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602356
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3058
reference_id CVE-2018-3058
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-3058
59
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://access.redhat.com/errata/RHSA-2018:3655
60
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://access.redhat.com/errata/RHSA-2019:1258
61
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://access.redhat.com/errata/RHSA-2019:2327
62
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://usn.ubuntu.com/3725-1/
63
reference_url https://usn.ubuntu.com/3725-2/
reference_id USN-3725-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:26Z/
url https://usn.ubuntu.com/3725-2/
fixed_packages
aliases CVE-2018-3058
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3nbc-83rh-f7e6
11
url VCID-4f4z-1nb6-jfcc
vulnerability_id VCID-4f4z-1nb6-jfcc
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2786.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2786
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24241
published_at 2026-04-07T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24425
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.2425
published_at 2026-04-21T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24275
published_at 2026-04-18T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24285
published_at 2026-04-16T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24307
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24269
published_at 2026-04-13T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24326
published_at 2026-04-12T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24368
published_at 2026-04-11T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24299
published_at 2026-04-01T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.2435
published_at 2026-04-09T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24458
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2786
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103779
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url http://www.securityfocus.com/bid/103779
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568945
reference_id 1568945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568945
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2786
reference_id CVE-2018-2786
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2786
13
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url https://security.gentoo.org/glsa/201908-24
14
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url https://access.redhat.com/errata/RHSA-2018:3655
15
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url https://access.redhat.com/errata/RHSA-2019:1258
16
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url https://usn.ubuntu.com/3629-1/
17
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:33Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2786
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4f4z-1nb6-jfcc
12
url VCID-4pa2-q79d-mqf1
vulnerability_id VCID-4pa2-q79d-mqf1
summary mysql: Server: DDL unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3077.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3077.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3077
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-02T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61373
published_at 2026-04-21T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61224
published_at 2026-04-01T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61348
published_at 2026-04-08T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61363
published_at 2026-04-09T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61384
published_at 2026-04-11T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-12T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61351
published_at 2026-04-13T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61389
published_at 2026-04-16T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.61394
published_at 2026-04-18T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.61332
published_at 2026-04-04T12:55:00Z
11
value 0.0041
scoring_system epss
scoring_elements 0.613
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3077
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:07Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:07Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104769
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:07Z/
url http://www.securityfocus.com/bid/104769
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:07Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602375
reference_id 1602375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602375
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3077
reference_id CVE-2018-3077
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3077
16
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:07Z/
url https://access.redhat.com/errata/RHSA-2018:3655
17
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:07Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3077
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pa2-q79d-mqf1
13
url VCID-5dmb-u13u-3yd4
vulnerability_id VCID-5dmb-u13u-3yd4
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3162.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3162
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.3533
published_at 2026-04-21T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.3523
published_at 2026-04-01T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35432
published_at 2026-04-02T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35411
published_at 2026-04-09T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35412
published_at 2026-04-11T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35376
published_at 2026-04-12T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35354
published_at 2026-04-13T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35393
published_at 2026-04-16T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35382
published_at 2026-04-18T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35456
published_at 2026-04-04T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.3534
published_at 2026-04-07T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.35386
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3162
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:42Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640316
reference_id 1640316
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640316
4
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:42Z/
url https://security.gentoo.org/glsa/201908-24
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:42Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:42Z/
url https://access.redhat.com/errata/RHSA-2019:1258
7
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:42Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3162
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dmb-u13u-3yd4
14
url VCID-7tqz-mrng-yfas
vulnerability_id VCID-7tqz-mrng-yfas
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2759.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2759
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29808
published_at 2026-04-07T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29947
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29768
published_at 2026-04-21T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29815
published_at 2026-04-18T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29835
published_at 2026-04-16T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29817
published_at 2026-04-13T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29866
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-11T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29902
published_at 2026-04-01T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-09T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29995
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2759
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103780
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url http://www.securityfocus.com/bid/103780
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568923
reference_id 1568923
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568923
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2759
reference_id CVE-2018-2759
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2759
19
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url https://security.gentoo.org/glsa/201908-24
20
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url https://access.redhat.com/errata/RHSA-2018:3655
21
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url https://access.redhat.com/errata/RHSA-2019:1258
22
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url https://usn.ubuntu.com/3629-1/
23
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:31Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2759
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tqz-mrng-yfas
15
url VCID-84dc-zgcp-eqen
vulnerability_id VCID-84dc-zgcp-eqen
summary mysql: Server: Merge unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3247.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3247
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34687
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34578
published_at 2026-04-21T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34467
published_at 2026-04-01T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34654
published_at 2026-04-09T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34657
published_at 2026-04-11T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34617
published_at 2026-04-12T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34594
published_at 2026-04-13T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34632
published_at 2026-04-16T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34618
published_at 2026-04-18T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34712
published_at 2026-04-04T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34582
published_at 2026-04-07T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34624
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3247
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/105600
reference_id 105600
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:05Z/
url http://www.securityfocus.com/bid/105600
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640317
reference_id 1640317
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640317
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:05Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:05Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3247
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84dc-zgcp-eqen
16
url VCID-8ce6-1122-k7fc
vulnerability_id VCID-8ce6-1122-k7fc
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3173.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3173.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3173
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37735
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37665
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37847
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37813
published_at 2026-04-09T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37828
published_at 2026-04-11T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37792
published_at 2026-04-12T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37767
published_at 2026-04-13T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37815
published_at 2026-04-16T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37795
published_at 2026-04-18T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-04T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.3775
published_at 2026-04-07T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37801
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3173
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:34Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640312
reference_id 1640312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640312
4
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:34Z/
url https://security.gentoo.org/glsa/201908-24
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:34Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:34Z/
url https://access.redhat.com/errata/RHSA-2019:1258
7
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:34Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3173
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ce6-1122-k7fc
17
url VCID-8wvq-hn5j-ubc2
vulnerability_id VCID-8wvq-hn5j-ubc2
summary mysql: Server: Security: Audit unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3144.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3144
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60562
published_at 2026-04-02T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60647
published_at 2026-04-21T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60488
published_at 2026-04-01T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60648
published_at 2026-04-11T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.60633
published_at 2026-04-12T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60612
published_at 2026-04-13T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60654
published_at 2026-04-16T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.6066
published_at 2026-04-18T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.6059
published_at 2026-04-04T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60559
published_at 2026-04-07T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60608
published_at 2026-04-08T12:55:00Z
11
value 0.00398
scoring_system epss
scoring_elements 0.60623
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3144
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:07Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640326
reference_id 1640326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640326
4
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:07Z/
url https://access.redhat.com/errata/RHSA-2018:3655
5
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:07Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3144
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8wvq-hn5j-ubc2
18
url VCID-8x3z-sc1j-xkfq
vulnerability_id VCID-8x3z-sc1j-xkfq
summary mysql: Group Replication GCS unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2776.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2776
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2776
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103791
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url http://www.securityfocus.com/bid/103791
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568936
reference_id 1568936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568936
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2776
reference_id CVE-2018-2776
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2776
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:06Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2776
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x3z-sc1j-xkfq
19
url VCID-9hdt-8a2a-tbh2
vulnerability_id VCID-9hdt-8a2a-tbh2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2780
reference_id
reference_type
scores
0
value 0.00494
scoring_system epss
scoring_elements 0.65697
published_at 2026-04-02T12:55:00Z
1
value 0.00494
scoring_system epss
scoring_elements 0.65767
published_at 2026-04-21T12:55:00Z
2
value 0.00494
scoring_system epss
scoring_elements 0.65648
published_at 2026-04-01T12:55:00Z
3
value 0.00494
scoring_system epss
scoring_elements 0.65693
published_at 2026-04-07T12:55:00Z
4
value 0.00494
scoring_system epss
scoring_elements 0.65744
published_at 2026-04-08T12:55:00Z
5
value 0.00494
scoring_system epss
scoring_elements 0.65755
published_at 2026-04-09T12:55:00Z
6
value 0.00494
scoring_system epss
scoring_elements 0.65777
published_at 2026-04-11T12:55:00Z
7
value 0.00494
scoring_system epss
scoring_elements 0.65762
published_at 2026-04-12T12:55:00Z
8
value 0.00494
scoring_system epss
scoring_elements 0.65733
published_at 2026-04-13T12:55:00Z
9
value 0.00494
scoring_system epss
scoring_elements 0.65768
published_at 2026-04-16T12:55:00Z
10
value 0.00494
scoring_system epss
scoring_elements 0.65781
published_at 2026-04-18T12:55:00Z
11
value 0.00494
scoring_system epss
scoring_elements 0.65727
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2780
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103778
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url http://www.securityfocus.com/bid/103778
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568941
reference_id 1568941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568941
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2780
reference_id CVE-2018-2780
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2780
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:44Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2780
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hdt-8a2a-tbh2
20
url VCID-9r3t-wqvg-4qen
vulnerability_id VCID-9r3t-wqvg-4qen
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3284.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3284
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.45375
published_at 2026-04-02T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45339
published_at 2026-04-07T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45417
published_at 2026-04-11T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45386
published_at 2026-04-12T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45388
published_at 2026-04-13T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45439
published_at 2026-04-16T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45434
published_at 2026-04-18T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45384
published_at 2026-04-21T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45295
published_at 2026-04-01T12:55:00Z
9
value 0.00226
scoring_system epss
scoring_elements 0.45395
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3284
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:25Z/
url http://www.securityfocus.com/bid/105594
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640310
reference_id 1640310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640310
5
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:25Z/
url https://security.gentoo.org/glsa/201908-24
6
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:25Z/
url https://access.redhat.com/errata/RHSA-2018:3655
7
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:25Z/
url https://access.redhat.com/errata/RHSA-2019:1258
8
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:25Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3284
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9r3t-wqvg-4qen
21
url VCID-9xaf-ssma-57bg
vulnerability_id VCID-9xaf-ssma-57bg
summary mysql: Server: RBR unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3278.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3278
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32243
published_at 2026-04-02T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32102
published_at 2026-04-21T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32114
published_at 2026-04-01T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32186
published_at 2026-04-11T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32148
published_at 2026-04-12T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32116
published_at 2026-04-13T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32151
published_at 2026-04-16T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32129
published_at 2026-04-18T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.3228
published_at 2026-04-04T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32106
published_at 2026-04-07T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32156
published_at 2026-04-08T12:55:00Z
11
value 0.00128
scoring_system epss
scoring_elements 0.32183
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3278
2
reference_url http://www.securityfocus.com/bid/105600
reference_id 105600
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:33Z/
url http://www.securityfocus.com/bid/105600
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640320
reference_id 1640320
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640320
4
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:33Z/
url https://access.redhat.com/errata/RHSA-2018:3655
5
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:33Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3278
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xaf-ssma-57bg
22
url VCID-acja-21he-tqas
vulnerability_id VCID-acja-21he-tqas
summary mysql: Server: Parser unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3155.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3155.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3155
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48578
published_at 2026-04-02T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48612
published_at 2026-04-21T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48542
published_at 2026-04-01T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48624
published_at 2026-04-11T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48597
published_at 2026-04-12T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.4861
published_at 2026-04-13T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48659
published_at 2026-04-16T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48655
published_at 2026-04-18T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48601
published_at 2026-04-04T12:55:00Z
9
value 0.00253
scoring_system epss
scoring_elements 0.48553
published_at 2026-04-07T12:55:00Z
10
value 0.00253
scoring_system epss
scoring_elements 0.48607
published_at 2026-04-08T12:55:00Z
11
value 0.00253
scoring_system epss
scoring_elements 0.48603
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3155
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:51Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640340
reference_id 1640340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640340
4
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:51Z/
url https://access.redhat.com/errata/RHSA-2018:3655
5
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:51Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3155
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-acja-21he-tqas
23
url VCID-b645-3y7g-7bgy
vulnerability_id VCID-b645-3y7g-7bgy
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3277.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3277
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37735
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37665
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37847
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37813
published_at 2026-04-09T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37828
published_at 2026-04-11T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37792
published_at 2026-04-12T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37767
published_at 2026-04-13T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37815
published_at 2026-04-16T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37795
published_at 2026-04-18T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-04T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.3775
published_at 2026-04-07T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37801
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3277
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:34Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640325
reference_id 1640325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640325
4
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:34Z/
url https://security.gentoo.org/glsa/201908-24
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:34Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:34Z/
url https://access.redhat.com/errata/RHSA-2019:1258
7
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:34Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3277
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b645-3y7g-7bgy
24
url VCID-b675-vjj2-2yb6
vulnerability_id VCID-b675-vjj2-2yb6
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3282.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3282
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.3241
published_at 2026-04-21T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32426
published_at 2026-04-13T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32462
published_at 2026-04-16T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.3244
published_at 2026-04-18T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34151
published_at 2026-04-07T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.33915
published_at 2026-04-01T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34254
published_at 2026-04-02T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34287
published_at 2026-04-04T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.3418
published_at 2026-04-12T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34223
published_at 2026-04-11T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34194
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/105610
reference_id 105610
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url http://www.securityfocus.com/bid/105610
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640322
reference_id 1640322
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640322
37
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://security.gentoo.org/glsa/201908-24
38
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
39
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://access.redhat.com/errata/RHSA-2018:3655
40
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://access.redhat.com/errata/RHSA-2019:1258
41
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://access.redhat.com/errata/RHSA-2019:2327
42
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://usn.ubuntu.com/3799-1/
43
reference_url https://usn.ubuntu.com/3799-2/
reference_id USN-3799-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:29Z/
url https://usn.ubuntu.com/3799-2/
fixed_packages
aliases CVE-2018-3282
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b675-vjj2-2yb6
25
url VCID-bchg-2uha-zbb9
vulnerability_id VCID-bchg-2uha-zbb9
summary mysql: Server: Partition unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3171.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3171
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-02T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61373
published_at 2026-04-21T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61224
published_at 2026-04-01T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61384
published_at 2026-04-11T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-12T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61351
published_at 2026-04-13T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61389
published_at 2026-04-16T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61394
published_at 2026-04-18T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61332
published_at 2026-04-04T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.613
published_at 2026-04-07T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.61348
published_at 2026-04-08T12:55:00Z
11
value 0.0041
scoring_system epss
scoring_elements 0.61363
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3171
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:35Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640334
reference_id 1640334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640334
4
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:35Z/
url https://access.redhat.com/errata/RHSA-2018:3655
5
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:35Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3171
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bchg-2uha-zbb9
26
url VCID-c48f-7fnj-8yfv
vulnerability_id VCID-c48f-7fnj-8yfv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2777.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2777
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29808
published_at 2026-04-07T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29947
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29768
published_at 2026-04-21T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29815
published_at 2026-04-18T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29835
published_at 2026-04-16T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-08T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29817
published_at 2026-04-13T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29866
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-11T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29902
published_at 2026-04-01T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-09T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29995
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2777
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103781
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url http://www.securityfocus.com/bid/103781
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568937
reference_id 1568937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568937
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2777
reference_id CVE-2018-2777
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2777
19
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url https://security.gentoo.org/glsa/201908-24
20
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url https://access.redhat.com/errata/RHSA-2018:3655
21
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url https://access.redhat.com/errata/RHSA-2019:1258
22
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url https://usn.ubuntu.com/3629-1/
23
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:39Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2777
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c48f-7fnj-8yfv
27
url VCID-cu2j-hqyu-skdp
vulnerability_id VCID-cu2j-hqyu-skdp
summary mysql: Server: Logging unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3283.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3283
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.61304
published_at 2026-04-02T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61373
published_at 2026-04-21T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61224
published_at 2026-04-01T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61363
published_at 2026-04-09T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61384
published_at 2026-04-11T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61369
published_at 2026-04-12T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61351
published_at 2026-04-13T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61389
published_at 2026-04-16T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61394
published_at 2026-04-18T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.61332
published_at 2026-04-04T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.613
published_at 2026-04-07T12:55:00Z
11
value 0.0041
scoring_system epss
scoring_elements 0.61348
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3283
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:27Z/
url http://www.securityfocus.com/bid/105594
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640333
reference_id 1640333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640333
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:27Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:27Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3283
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cu2j-hqyu-skdp
28
url VCID-dfbz-5n6w-syd9
vulnerability_id VCID-dfbz-5n6w-syd9
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2761.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2761
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50192
published_at 2026-04-18T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50099
published_at 2026-04-01T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.50134
published_at 2026-04-02T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.50161
published_at 2026-04-04T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50112
published_at 2026-04-07T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50166
published_at 2026-04-21T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50159
published_at 2026-04-09T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50176
published_at 2026-04-11T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.5015
published_at 2026-04-12T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50147
published_at 2026-04-13T12:55:00Z
10
value 0.00267
scoring_system epss
scoring_elements 0.50191
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103820
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url http://www.securityfocus.com/bid/103820
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568924
reference_id 1568924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568924
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2761
reference_id CVE-2018-2761
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2761
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:11Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2761
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfbz-5n6w-syd9
29
url VCID-fvuq-f6v7-j3bn
vulnerability_id VCID-fvuq-f6v7-j3bn
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3251.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3251.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3251
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.49939
published_at 2026-04-02T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49916
published_at 2026-04-07T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49971
published_at 2026-04-08T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49963
published_at 2026-04-09T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49982
published_at 2026-04-11T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-12T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.4995
published_at 2026-04-13T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49995
published_at 2026-04-16T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49996
published_at 2026-04-18T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49969
published_at 2026-04-21T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49902
published_at 2026-04-01T12:55:00Z
11
value 0.00265
scoring_system epss
scoring_elements 0.49966
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3251
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/105600
reference_id 105600
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:56Z/
url http://www.securityfocus.com/bid/105600
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640335
reference_id 1640335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640335
37
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:56Z/
url https://security.gentoo.org/glsa/201908-24
38
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:56Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
39
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:56Z/
url https://access.redhat.com/errata/RHSA-2018:3655
40
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:56Z/
url https://access.redhat.com/errata/RHSA-2019:1258
41
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:05:56Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3251
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fvuq-f6v7-j3bn
30
url VCID-gdvw-26ux-7ygu
vulnerability_id VCID-gdvw-26ux-7ygu
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3200.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3200.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3200
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37735
published_at 2026-04-21T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37665
published_at 2026-04-01T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37847
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37813
published_at 2026-04-09T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37828
published_at 2026-04-11T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37792
published_at 2026-04-12T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37767
published_at 2026-04-13T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37815
published_at 2026-04-16T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37795
published_at 2026-04-18T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-04T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.3775
published_at 2026-04-07T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37801
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3200
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:53Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640308
reference_id 1640308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640308
4
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:53Z/
url https://security.gentoo.org/glsa/201908-24
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:53Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:53Z/
url https://access.redhat.com/errata/RHSA-2019:1258
7
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:06:53Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3200
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdvw-26ux-7ygu
31
url VCID-h3t4-kd8k-cuen
vulnerability_id VCID-h3t4-kd8k-cuen
summary mysql: Audit Log unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3071.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3071.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3071
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-02T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63926
published_at 2026-04-18T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63802
published_at 2026-04-01T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63847
published_at 2026-04-07T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63898
published_at 2026-04-08T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63915
published_at 2026-04-09T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63928
published_at 2026-04-11T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63914
published_at 2026-04-12T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63881
published_at 2026-04-13T12:55:00Z
9
value 0.00456
scoring_system epss
scoring_elements 0.63917
published_at 2026-04-21T12:55:00Z
10
value 0.00456
scoring_system epss
scoring_elements 0.6389
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3071
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:11Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:11Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104784
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:11Z/
url http://www.securityfocus.com/bid/104784
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:11Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602370
reference_id 1602370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602370
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3071
reference_id CVE-2018-3071
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3071
16
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:11Z/
url https://access.redhat.com/errata/RHSA-2018:3655
17
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:11Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3071
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h3t4-kd8k-cuen
32
url VCID-j2wu-2rx7-3yf2
vulnerability_id VCID-j2wu-2rx7-3yf2
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2813.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2813
reference_id
reference_type
scores
0
value 0.00307
scoring_system epss
scoring_elements 0.53961
published_at 2026-04-21T12:55:00Z
1
value 0.00307
scoring_system epss
scoring_elements 0.53854
published_at 2026-04-01T12:55:00Z
2
value 0.00307
scoring_system epss
scoring_elements 0.53871
published_at 2026-04-02T12:55:00Z
3
value 0.00307
scoring_system epss
scoring_elements 0.539
published_at 2026-04-04T12:55:00Z
4
value 0.00307
scoring_system epss
scoring_elements 0.53874
published_at 2026-04-07T12:55:00Z
5
value 0.00307
scoring_system epss
scoring_elements 0.53926
published_at 2026-04-08T12:55:00Z
6
value 0.00307
scoring_system epss
scoring_elements 0.53924
published_at 2026-04-09T12:55:00Z
7
value 0.00307
scoring_system epss
scoring_elements 0.53971
published_at 2026-04-11T12:55:00Z
8
value 0.00307
scoring_system epss
scoring_elements 0.53954
published_at 2026-04-12T12:55:00Z
9
value 0.00307
scoring_system epss
scoring_elements 0.53937
published_at 2026-04-13T12:55:00Z
10
value 0.00307
scoring_system epss
scoring_elements 0.53974
published_at 2026-04-16T12:55:00Z
11
value 0.00307
scoring_system epss
scoring_elements 0.5398
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103830
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url http://www.securityfocus.com/bid/103830
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568951
reference_id 1568951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568951
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2813
reference_id CVE-2018-2813
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-2813
71
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://security.gentoo.org/glsa/201908-24
72
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:1254
73
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:2439
74
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:2729
75
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2018:3655
76
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://access.redhat.com/errata/RHSA-2019:1258
77
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://usn.ubuntu.com/3629-1/
78
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://usn.ubuntu.com/3629-2/
79
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:35Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2813
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wu-2rx7-3yf2
33
url VCID-jttf-5mgy-73d7
vulnerability_id VCID-jttf-5mgy-73d7
summary mysql: Server: Memcached unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3062.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3062.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3062
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-04T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67348
published_at 2026-04-21T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67336
published_at 2026-04-08T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67285
published_at 2026-04-07T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.6737
published_at 2026-04-18T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.67323
published_at 2026-04-13T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67358
published_at 2026-04-16T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67371
published_at 2026-04-11T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-01T12:55:00Z
9
value 0.00533
scoring_system epss
scoring_elements 0.6735
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3062
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:23Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
4
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:23Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
5
reference_url http://www.securityfocus.com/bid/104776
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:23Z/
url http://www.securityfocus.com/bid/104776
6
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:23Z/
url http://www.securitytracker.com/id/1041294
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602360
reference_id 1602360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602360
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3062
reference_id CVE-2018-3062
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3062
17
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:23Z/
url https://access.redhat.com/errata/RHSA-2018:3655
18
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:23Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3062
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jttf-5mgy-73d7
34
url VCID-kfw6-vf1q-8bfz
vulnerability_id VCID-kfw6-vf1q-8bfz
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3056.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3056
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61152
published_at 2026-04-02T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-21T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61075
published_at 2026-04-01T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61194
published_at 2026-04-08T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61209
published_at 2026-04-09T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61229
published_at 2026-04-11T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61216
published_at 2026-04-12T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61197
published_at 2026-04-13T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61237
published_at 2026-04-16T12:55:00Z
9
value 0.00408
scoring_system epss
scoring_elements 0.61242
published_at 2026-04-18T12:55:00Z
10
value 0.00408
scoring_system epss
scoring_elements 0.61181
published_at 2026-04-04T12:55:00Z
11
value 0.00408
scoring_system epss
scoring_elements 0.61146
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3056
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:27Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:27Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104769
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:27Z/
url http://www.securityfocus.com/bid/104769
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:27Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602355
reference_id 1602355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602355
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3056
reference_id CVE-2018-3056
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-3056
16
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:27Z/
url https://access.redhat.com/errata/RHSA-2018:3655
17
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:27Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3056
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfw6-vf1q-8bfz
35
url VCID-ks79-8usy-zfbw
vulnerability_id VCID-ks79-8usy-zfbw
summary mysql: Server: Pluggable Auth unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2769.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2769.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2769
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2769
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103876
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url http://www.securityfocus.com/bid/103876
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568927
reference_id 1568927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568927
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2769
reference_id CVE-2018-2769
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2769
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:15Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2769
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ks79-8usy-zfbw
36
url VCID-m4mk-fw8a-hyb8
vulnerability_id VCID-m4mk-fw8a-hyb8
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3065.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3065
reference_id
reference_type
scores
0
value 0.00533
scoring_system epss
scoring_elements 0.67285
published_at 2026-04-07T12:55:00Z
1
value 0.00533
scoring_system epss
scoring_elements 0.67348
published_at 2026-04-21T12:55:00Z
2
value 0.00533
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-01T12:55:00Z
3
value 0.00533
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-04T12:55:00Z
4
value 0.00533
scoring_system epss
scoring_elements 0.67336
published_at 2026-04-08T12:55:00Z
5
value 0.00533
scoring_system epss
scoring_elements 0.6735
published_at 2026-04-09T12:55:00Z
6
value 0.00533
scoring_system epss
scoring_elements 0.67371
published_at 2026-04-11T12:55:00Z
7
value 0.00533
scoring_system epss
scoring_elements 0.67358
published_at 2026-04-16T12:55:00Z
8
value 0.00533
scoring_system epss
scoring_elements 0.67323
published_at 2026-04-13T12:55:00Z
9
value 0.00533
scoring_system epss
scoring_elements 0.6737
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3065
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:20Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:20Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104769
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:20Z/
url http://www.securityfocus.com/bid/104769
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:20Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602365
reference_id 1602365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602365
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3065
reference_id CVE-2018-3065
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3065
16
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:20Z/
url https://access.redhat.com/errata/RHSA-2018:3655
17
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:20Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3065
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4mk-fw8a-hyb8
37
url VCID-mduv-envj-6uap
vulnerability_id VCID-mduv-envj-6uap
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2758.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2758
reference_id
reference_type
scores
0
value 0.00874
scoring_system epss
scoring_elements 0.7529
published_at 2026-04-21T12:55:00Z
1
value 0.00874
scoring_system epss
scoring_elements 0.75201
published_at 2026-04-01T12:55:00Z
2
value 0.00874
scoring_system epss
scoring_elements 0.75204
published_at 2026-04-02T12:55:00Z
3
value 0.00874
scoring_system epss
scoring_elements 0.75212
published_at 2026-04-07T12:55:00Z
4
value 0.00874
scoring_system epss
scoring_elements 0.75254
published_at 2026-04-08T12:55:00Z
5
value 0.00874
scoring_system epss
scoring_elements 0.75265
published_at 2026-04-09T12:55:00Z
6
value 0.00874
scoring_system epss
scoring_elements 0.75286
published_at 2026-04-11T12:55:00Z
7
value 0.00874
scoring_system epss
scoring_elements 0.75263
published_at 2026-04-12T12:55:00Z
8
value 0.00874
scoring_system epss
scoring_elements 0.75253
published_at 2026-04-13T12:55:00Z
9
value 0.00874
scoring_system epss
scoring_elements 0.75292
published_at 2026-04-16T12:55:00Z
10
value 0.00874
scoring_system epss
scoring_elements 0.75299
published_at 2026-04-18T12:55:00Z
11
value 0.00874
scoring_system epss
scoring_elements 0.75235
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2758
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103802
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url http://www.securityfocus.com/bid/103802
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568922
reference_id 1568922
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568922
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2758
reference_id CVE-2018-2758
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2758
9
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url https://access.redhat.com/errata/RHSA-2018:1254
10
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url https://access.redhat.com/errata/RHSA-2018:3655
11
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url https://usn.ubuntu.com/3629-1/
12
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:01Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2758
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mduv-envj-6uap
38
url VCID-mgxt-87ak-fuaq
vulnerability_id VCID-mgxt-87ak-fuaq
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3156.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3156
reference_id
reference_type
scores
0
value 0.00252
scoring_system epss
scoring_elements 0.48548
published_at 2026-04-21T12:55:00Z
1
value 0.00252
scoring_system epss
scoring_elements 0.48488
published_at 2026-04-07T12:55:00Z
2
value 0.00252
scoring_system epss
scoring_elements 0.48542
published_at 2026-04-08T12:55:00Z
3
value 0.00252
scoring_system epss
scoring_elements 0.48538
published_at 2026-04-09T12:55:00Z
4
value 0.00252
scoring_system epss
scoring_elements 0.48559
published_at 2026-04-11T12:55:00Z
5
value 0.00252
scoring_system epss
scoring_elements 0.48532
published_at 2026-04-12T12:55:00Z
6
value 0.00252
scoring_system epss
scoring_elements 0.48545
published_at 2026-04-13T12:55:00Z
7
value 0.00252
scoring_system epss
scoring_elements 0.48595
published_at 2026-04-16T12:55:00Z
8
value 0.00252
scoring_system epss
scoring_elements 0.48591
published_at 2026-04-18T12:55:00Z
9
value 0.00252
scoring_system epss
scoring_elements 0.48513
published_at 2026-04-02T12:55:00Z
10
value 0.00252
scoring_system epss
scoring_elements 0.48476
published_at 2026-04-01T12:55:00Z
11
value 0.00252
scoring_system epss
scoring_elements 0.48535
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url http://www.securityfocus.com/bid/105600
reference_id 105600
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:50Z/
url http://www.securityfocus.com/bid/105600
35
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640318
reference_id 1640318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640318
36
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:50Z/
url https://security.gentoo.org/glsa/201908-24
37
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:50Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
38
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:50Z/
url https://access.redhat.com/errata/RHSA-2018:3655
39
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:50Z/
url https://access.redhat.com/errata/RHSA-2019:1258
40
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:50Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3156
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mgxt-87ak-fuaq
39
url VCID-mvfq-1e2q-cucx
vulnerability_id VCID-mvfq-1e2q-cucx
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3185.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3185
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29422
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29533
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29601
published_at 2026-04-02T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29572
published_at 2026-04-09T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29574
published_at 2026-04-11T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29528
published_at 2026-04-12T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29476
published_at 2026-04-13T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29495
published_at 2026-04-16T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29467
published_at 2026-04-18T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29649
published_at 2026-04-04T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29471
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3185
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:22Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640337
reference_id 1640337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640337
4
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:22Z/
url https://security.gentoo.org/glsa/201908-24
5
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:22Z/
url https://access.redhat.com/errata/RHSA-2018:3655
6
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:22Z/
url https://access.redhat.com/errata/RHSA-2019:1258
7
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:22Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3185
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mvfq-1e2q-cucx
40
url VCID-n8mq-dbkq-57fc
vulnerability_id VCID-n8mq-dbkq-57fc
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2782.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2782
reference_id
reference_type
scores
0
value 0.00349
scoring_system epss
scoring_elements 0.57423
published_at 2026-04-21T12:55:00Z
1
value 0.00349
scoring_system epss
scoring_elements 0.57311
published_at 2026-04-01T12:55:00Z
2
value 0.00349
scoring_system epss
scoring_elements 0.57393
published_at 2026-04-02T12:55:00Z
3
value 0.00349
scoring_system epss
scoring_elements 0.57416
published_at 2026-04-04T12:55:00Z
4
value 0.00349
scoring_system epss
scoring_elements 0.57392
published_at 2026-04-07T12:55:00Z
5
value 0.00349
scoring_system epss
scoring_elements 0.57445
published_at 2026-04-08T12:55:00Z
6
value 0.00349
scoring_system epss
scoring_elements 0.57448
published_at 2026-04-16T12:55:00Z
7
value 0.00349
scoring_system epss
scoring_elements 0.57464
published_at 2026-04-11T12:55:00Z
8
value 0.00349
scoring_system epss
scoring_elements 0.57441
published_at 2026-04-12T12:55:00Z
9
value 0.00349
scoring_system epss
scoring_elements 0.57422
published_at 2026-04-13T12:55:00Z
10
value 0.00349
scoring_system epss
scoring_elements 0.57444
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
35
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
36
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://www.debian.org/security/2018/dsa-4341
37
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
38
reference_url http://www.securityfocus.com/bid/103799
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url http://www.securityfocus.com/bid/103799
39
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url http://www.securitytracker.com/id/1040698
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568943
reference_id 1568943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568943
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2782
reference_id CVE-2018-2782
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2782
55
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://security.gentoo.org/glsa/201908-24
56
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://access.redhat.com/errata/RHSA-2018:1254
57
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://access.redhat.com/errata/RHSA-2018:3655
58
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://access.redhat.com/errata/RHSA-2019:1258
59
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://usn.ubuntu.com/3629-1/
60
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:24Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2782
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n8mq-dbkq-57fc
41
url VCID-pbjf-9583-kudq
vulnerability_id VCID-pbjf-9583-kudq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2778.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2778
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2778
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103785
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url http://www.securityfocus.com/bid/103785
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568938
reference_id 1568938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568938
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2778
reference_id CVE-2018-2778
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2778
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:50Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2778
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbjf-9583-kudq
42
url VCID-ppqe-sngx-5fgh
vulnerability_id VCID-ppqe-sngx-5fgh
summary mysql: Server: Parser unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3133.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3133
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.50007
published_at 2026-04-21T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49936
published_at 2026-04-01T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49974
published_at 2026-04-02T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49952
published_at 2026-04-07T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.50006
published_at 2026-04-08T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.5
published_at 2026-04-09T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.50018
published_at 2026-04-11T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.4999
published_at 2026-04-12T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49987
published_at 2026-04-13T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.50033
published_at 2026-04-16T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.50035
published_at 2026-04-18T12:55:00Z
11
value 0.00265
scoring_system epss
scoring_elements 0.50001
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3133
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/105610
reference_id 105610
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:21Z/
url http://www.securityfocus.com/bid/105610
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640331
reference_id 1640331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640331
5
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2439
6
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:21Z/
url https://access.redhat.com/errata/RHSA-2018:3655
7
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:21Z/
url https://access.redhat.com/errata/RHSA-2019:1258
8
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:21Z/
url https://usn.ubuntu.com/3799-1/
9
reference_url https://usn.ubuntu.com/3799-2/
reference_id USN-3799-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:08:21Z/
url https://usn.ubuntu.com/3799-2/
fixed_packages
aliases CVE-2018-3133
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ppqe-sngx-5fgh
43
url VCID-qax4-fpdj-wqhk
vulnerability_id VCID-qax4-fpdj-wqhk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2812.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2812
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60727
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60823
published_at 2026-04-18T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60653
published_at 2026-04-01T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60757
published_at 2026-04-04T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60723
published_at 2026-04-07T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.60771
published_at 2026-04-08T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60787
published_at 2026-04-09T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60808
published_at 2026-04-21T12:55:00Z
8
value 0.00401
scoring_system epss
scoring_elements 0.60794
published_at 2026-04-12T12:55:00Z
9
value 0.00401
scoring_system epss
scoring_elements 0.60775
published_at 2026-04-13T12:55:00Z
10
value 0.00401
scoring_system epss
scoring_elements 0.60817
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2812
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103836
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url http://www.securityfocus.com/bid/103836
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568950
reference_id 1568950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568950
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2812
reference_id CVE-2018-2812
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2812
19
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url https://access.redhat.com/errata/RHSA-2018:3655
20
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url https://usn.ubuntu.com/3629-1/
21
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:56Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2812
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qax4-fpdj-wqhk
44
url VCID-qp22-6sda-9fdv
vulnerability_id VCID-qp22-6sda-9fdv
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2810.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2810.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2810
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29808
published_at 2026-04-07T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29947
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29768
published_at 2026-04-21T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29815
published_at 2026-04-18T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.2987
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29835
published_at 2026-04-16T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29817
published_at 2026-04-13T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29866
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-11T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29902
published_at 2026-04-01T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-09T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29995
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2810
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103783
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url http://www.securityfocus.com/bid/103783
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568949
reference_id 1568949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568949
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2810
reference_id CVE-2018-2810
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2810
19
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url https://security.gentoo.org/glsa/201908-24
20
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url https://access.redhat.com/errata/RHSA-2018:3655
21
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url https://access.redhat.com/errata/RHSA-2019:1258
22
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url https://usn.ubuntu.com/3629-1/
23
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:23Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2810
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp22-6sda-9fdv
45
url VCID-rn8y-91ua-nkf6
vulnerability_id VCID-rn8y-91ua-nkf6
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2784.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2784
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50204
published_at 2026-04-21T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50124
published_at 2026-04-01T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.50169
published_at 2026-04-02T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.50197
published_at 2026-04-04T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50147
published_at 2026-04-07T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50201
published_at 2026-04-08T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-09T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50223
published_at 2026-04-11T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50196
published_at 2026-04-12T12:55:00Z
9
value 0.00267
scoring_system epss
scoring_elements 0.50184
published_at 2026-04-13T12:55:00Z
10
value 0.00267
scoring_system epss
scoring_elements 0.50228
published_at 2026-04-16T12:55:00Z
11
value 0.00267
scoring_system epss
scoring_elements 0.50229
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2784
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
35
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
36
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://www.debian.org/security/2018/dsa-4341
37
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
38
reference_url http://www.securityfocus.com/bid/103801
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url http://www.securityfocus.com/bid/103801
39
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url http://www.securitytracker.com/id/1040698
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568944
reference_id 1568944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568944
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2784
reference_id CVE-2018-2784
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2784
55
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://security.gentoo.org/glsa/201908-24
56
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://access.redhat.com/errata/RHSA-2018:1254
57
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://access.redhat.com/errata/RHSA-2018:3655
58
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://access.redhat.com/errata/RHSA-2019:1258
59
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://usn.ubuntu.com/3629-1/
60
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:34Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2784
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rn8y-91ua-nkf6
46
url VCID-s1vz-6nxa-n7cj
vulnerability_id VCID-s1vz-6nxa-n7cj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3064.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3064.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3064
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40826
published_at 2026-04-21T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40836
published_at 2026-04-01T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40919
published_at 2026-04-02T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40946
published_at 2026-04-04T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40874
published_at 2026-04-07T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40924
published_at 2026-04-08T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.4093
published_at 2026-04-09T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40948
published_at 2026-04-11T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40913
published_at 2026-04-12T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40894
published_at 2026-04-13T12:55:00Z
10
value 0.0019
scoring_system epss
scoring_elements 0.40936
published_at 2026-04-16T12:55:00Z
11
value 0.0019
scoring_system epss
scoring_elements 0.40905
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3064
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
36
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
37
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url https://www.debian.org/security/2018/dsa-4341
38
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
39
reference_url http://www.securityfocus.com/bid/104776
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url http://www.securityfocus.com/bid/104776
40
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url http://www.securitytracker.com/id/1041294
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602364
reference_id 1602364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602364
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3064
reference_id CVE-2018-3064
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3064
54
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url https://access.redhat.com/errata/RHSA-2018:3655
55
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url https://access.redhat.com/errata/RHSA-2019:1258
56
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:21Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3064
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1vz-6nxa-n7cj
47
url VCID-s4fx-n659-c3en
vulnerability_id VCID-s4fx-n659-c3en
summary mysql: Server: Performance Schema unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2846.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2846
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2846
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103790
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url http://www.securityfocus.com/bid/103790
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568958
reference_id 1568958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568958
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2846
reference_id CVE-2018-2846
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2846
19
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url https://access.redhat.com/errata/RHSA-2018:3655
20
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url https://usn.ubuntu.com/3629-1/
21
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:41Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2846
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4fx-n659-c3en
48
url VCID-s993-j33e-tydt
vulnerability_id VCID-s993-j33e-tydt
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2787.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2787
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26365
published_at 2026-04-21T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26522
published_at 2026-04-09T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26575
published_at 2026-04-02T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26619
published_at 2026-04-04T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26404
published_at 2026-04-07T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26473
published_at 2026-04-08T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26529
published_at 2026-04-11T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26483
published_at 2026-04-12T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26424
published_at 2026-04-13T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26431
published_at 2026-04-16T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26402
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2787
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
35
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
36
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://www.debian.org/security/2018/dsa-4341
37
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
38
reference_url http://www.securityfocus.com/bid/103804
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url http://www.securityfocus.com/bid/103804
39
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url http://www.securitytracker.com/id/1040698
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568946
reference_id 1568946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568946
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2787
reference_id CVE-2018-2787
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2787
47
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://security.gentoo.org/glsa/201908-24
48
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://access.redhat.com/errata/RHSA-2018:1254
49
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://access.redhat.com/errata/RHSA-2018:3655
50
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://access.redhat.com/errata/RHSA-2019:1258
51
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://usn.ubuntu.com/3629-1/
52
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:16Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2787
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s993-j33e-tydt
49
url VCID-sy6p-5km4-1kcy
vulnerability_id VCID-sy6p-5km4-1kcy
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2771.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2771.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2771
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35743
published_at 2026-04-21T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35687
published_at 2026-04-01T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35885
published_at 2026-04-02T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35915
published_at 2026-04-04T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35745
published_at 2026-04-07T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35796
published_at 2026-04-08T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35818
published_at 2026-04-09T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35826
published_at 2026-04-11T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35786
published_at 2026-04-12T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35763
published_at 2026-04-13T12:55:00Z
10
value 0.00151
scoring_system epss
scoring_elements 0.35803
published_at 2026-04-16T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35792
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2771
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103828
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url http://www.securityfocus.com/bid/103828
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568931
reference_id 1568931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568931
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2771
reference_id CVE-2018-2771
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2771
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:13Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2771
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy6p-5km4-1kcy
50
url VCID-t7f9-akcy-uqgz
vulnerability_id VCID-t7f9-akcy-uqgz
summary mysql: InnoDB unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3060.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3060
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-21T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30908
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.3083
published_at 2026-04-08T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30861
published_at 2026-04-09T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30863
published_at 2026-04-11T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30819
published_at 2026-04-12T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30774
published_at 2026-04-13T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30801
published_at 2026-04-16T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30781
published_at 2026-04-18T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30779
published_at 2026-04-01T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30956
published_at 2026-04-04T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30772
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3060
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104769
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url http://www.securityfocus.com/bid/104769
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602357
reference_id 1602357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602357
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3060
reference_id CVE-2018-3060
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3060
17
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url https://access.redhat.com/errata/RHSA-2018:3655
18
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url https://access.redhat.com/errata/RHSA-2019:1258
19
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:25Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3060
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7f9-akcy-uqgz
51
url VCID-tarh-68rn-fqfz
vulnerability_id VCID-tarh-68rn-fqfz
summary mysql: Server: Replication unspecified vulnerability (CPU Jul 2019)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2731.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-2731.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-2731
reference_id
reference_type
scores
0
value 0.00571
scoring_system epss
scoring_elements 0.68559
published_at 2026-04-01T12:55:00Z
1
value 0.00571
scoring_system epss
scoring_elements 0.68577
published_at 2026-04-02T12:55:00Z
2
value 0.00571
scoring_system epss
scoring_elements 0.68654
published_at 2026-04-21T12:55:00Z
3
value 0.00571
scoring_system epss
scoring_elements 0.68653
published_at 2026-04-12T12:55:00Z
4
value 0.00571
scoring_system epss
scoring_elements 0.68663
published_at 2026-04-16T12:55:00Z
5
value 0.00571
scoring_system epss
scoring_elements 0.68674
published_at 2026-04-18T12:55:00Z
6
value 0.00571
scoring_system epss
scoring_elements 0.68596
published_at 2026-04-04T12:55:00Z
7
value 0.00571
scoring_system epss
scoring_elements 0.68573
published_at 2026-04-07T12:55:00Z
8
value 0.00571
scoring_system epss
scoring_elements 0.68624
published_at 2026-04-13T12:55:00Z
9
value 0.00571
scoring_system epss
scoring_elements 0.68642
published_at 2026-04-09T12:55:00Z
10
value 0.00571
scoring_system epss
scoring_elements 0.68666
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-2731
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1731996
reference_id 1731996
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1731996
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id cpujul2019-5072835.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:36Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
4
reference_url https://support.f5.com/csp/article/K51272092
reference_id K51272092
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:36Z/
url https://support.f5.com/csp/article/K51272092
5
reference_url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K51272092?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T16:18:36Z/
url https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS
6
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3655
fixed_packages
aliases CVE-2019-2731
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tarh-68rn-fqfz
52
url VCID-tcv3-rvq7-eqcw
vulnerability_id VCID-tcv3-rvq7-eqcw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3187.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3187
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34687
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34578
published_at 2026-04-21T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34467
published_at 2026-04-01T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34657
published_at 2026-04-11T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34617
published_at 2026-04-12T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34594
published_at 2026-04-13T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34632
published_at 2026-04-16T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34618
published_at 2026-04-18T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34712
published_at 2026-04-04T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34582
published_at 2026-04-07T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34624
published_at 2026-04-08T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34654
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3187
2
reference_url http://www.securityfocus.com/bid/105594
reference_id 105594
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:17Z/
url http://www.securityfocus.com/bid/105594
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640324
reference_id 1640324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640324
4
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:17Z/
url https://access.redhat.com/errata/RHSA-2018:3655
5
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:17Z/
url https://usn.ubuntu.com/3799-1/
fixed_packages
aliases CVE-2018-3187
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcv3-rvq7-eqcw
53
url VCID-u9aw-t2h8-y7hk
vulnerability_id VCID-u9aw-t2h8-y7hk
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3066.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3066
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.341
published_at 2026-04-11T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34137
published_at 2026-04-02T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34103
published_at 2026-04-09T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34072
published_at 2026-04-08T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34029
published_at 2026-04-07T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34169
published_at 2026-04-04T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.34058
published_at 2026-04-12T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.33798
published_at 2026-04-01T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34751
published_at 2026-04-21T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.3477
published_at 2026-04-13T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34805
published_at 2026-04-16T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34791
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html
36
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
37
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
38
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://www.debian.org/security/2018/dsa-4341
39
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
40
reference_url http://www.securityfocus.com/bid/104766
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url http://www.securityfocus.com/bid/104766
41
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url http://www.securitytracker.com/id/1041294
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602366
reference_id 1602366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602366
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3066
reference_id CVE-2018-3066
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-3066
59
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://access.redhat.com/errata/RHSA-2018:3655
60
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://access.redhat.com/errata/RHSA-2019:1258
61
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://access.redhat.com/errata/RHSA-2019:2327
62
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://usn.ubuntu.com/3725-1/
63
reference_url https://usn.ubuntu.com/3725-2/
reference_id USN-3725-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:19Z/
url https://usn.ubuntu.com/3725-2/
fixed_packages
aliases CVE-2018-3066
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9aw-t2h8-y7hk
54
url VCID-umzj-y9yv-cqfr
vulnerability_id VCID-umzj-y9yv-cqfr
summary mysql: Client mysqldump unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3070.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3070
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58981
published_at 2026-04-21T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58861
published_at 2026-04-01T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.58936
published_at 2026-04-02T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.58958
published_at 2026-04-04T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.58924
published_at 2026-04-07T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.58976
published_at 2026-04-08T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.58982
published_at 2026-04-09T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.59001
published_at 2026-04-11T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.58983
published_at 2026-04-12T12:55:00Z
9
value 0.00372
scoring_system epss
scoring_elements 0.58964
published_at 2026-04-13T12:55:00Z
10
value 0.00372
scoring_system epss
scoring_elements 0.58998
published_at 2026-04-16T12:55:00Z
11
value 0.00372
scoring_system epss
scoring_elements 0.59002
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3070
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
4
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
6
reference_url http://www.securityfocus.com/bid/104766
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url http://www.securityfocus.com/bid/104766
7
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url http://www.securitytracker.com/id/1041294
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602369
reference_id 1602369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602369
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3070
reference_id CVE-2018-3070
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3070
20
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url https://access.redhat.com/errata/RHSA-2018:3655
21
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url https://usn.ubuntu.com/3725-1/
22
reference_url https://usn.ubuntu.com/3725-2/
reference_id USN-3725-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:12Z/
url https://usn.ubuntu.com/3725-2/
fixed_packages
aliases CVE-2018-3070
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umzj-y9yv-cqfr
55
url VCID-ux3x-md4q-4udu
vulnerability_id VCID-ux3x-md4q-4udu
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3174.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3174
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08755
published_at 2026-04-21T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08659
published_at 2026-04-07T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08687
published_at 2026-04-02T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08735
published_at 2026-04-08T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.0876
published_at 2026-04-09T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08761
published_at 2026-04-11T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08739
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08724
published_at 2026-04-13T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08614
published_at 2026-04-16T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08602
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url http://www.securityfocus.com/bid/105612
reference_id 105612
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url http://www.securityfocus.com/bid/105612
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1640321
reference_id 1640321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1640321
37
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url https://security.gentoo.org/glsa/201908-24
38
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
reference_id msg00007.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html
39
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url https://access.redhat.com/errata/RHSA-2018:3655
40
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url https://access.redhat.com/errata/RHSA-2019:1258
41
reference_url https://usn.ubuntu.com/3799-1/
reference_id USN-3799-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url https://usn.ubuntu.com/3799-1/
42
reference_url https://usn.ubuntu.com/3799-2/
reference_id USN-3799-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:07:33Z/
url https://usn.ubuntu.com/3799-2/
fixed_packages
aliases CVE-2018-3174
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ux3x-md4q-4udu
56
url VCID-v3jf-a6dy-efdr
vulnerability_id VCID-v3jf-a6dy-efdr
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2816.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2816
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2816
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103789
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url http://www.securityfocus.com/bid/103789
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568953
reference_id 1568953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568953
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2816
reference_id CVE-2018-2816
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2816
19
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url https://access.redhat.com/errata/RHSA-2018:3655
20
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url https://usn.ubuntu.com/3629-1/
21
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:26Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2816
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3jf-a6dy-efdr
57
url VCID-wfy8-47px-8kbj
vulnerability_id VCID-wfy8-47px-8kbj
summary mysql: Server: DML unspecified vulnerability (CPU Jul 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3061.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3061
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63863
published_at 2026-04-02T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63926
published_at 2026-04-18T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63802
published_at 2026-04-01T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63847
published_at 2026-04-07T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63898
published_at 2026-04-08T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63915
published_at 2026-04-09T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63928
published_at 2026-04-11T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63914
published_at 2026-04-12T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63881
published_at 2026-04-13T12:55:00Z
9
value 0.00456
scoring_system epss
scoring_elements 0.63917
published_at 2026-04-21T12:55:00Z
10
value 0.00456
scoring_system epss
scoring_elements 0.6389
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3061
2
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:24Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:24Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
4
reference_url http://www.securityfocus.com/bid/104785
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:24Z/
url http://www.securityfocus.com/bid/104785
5
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:24Z/
url http://www.securitytracker.com/id/1041294
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602359
reference_id 1602359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602359
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3061
reference_id CVE-2018-3061
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3061
16
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:24Z/
url https://access.redhat.com/errata/RHSA-2018:3655
17
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:24Z/
url https://usn.ubuntu.com/3725-1/
fixed_packages
aliases CVE-2018-3061
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfy8-47px-8kbj
58
url VCID-xuhv-wrut-wuez
vulnerability_id VCID-xuhv-wrut-wuez
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2819.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2819
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.4998
published_at 2026-04-18T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-01T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49921
published_at 2026-04-02T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49949
published_at 2026-04-04T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49899
published_at 2026-04-07T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-21T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.49946
published_at 2026-04-09T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49965
published_at 2026-04-11T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49936
published_at 2026-04-12T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49934
published_at 2026-04-13T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49979
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2819
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103814
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url http://www.securityfocus.com/bid/103814
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568956
reference_id 1568956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568956
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2819
reference_id CVE-2018-2819
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2819
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:03Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2819
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xuhv-wrut-wuez
59
url VCID-yhz8-4u65-xqd6
vulnerability_id VCID-yhz8-4u65-xqd6
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2779.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2779
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59464
published_at 2026-04-02T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59526
published_at 2026-04-21T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59391
published_at 2026-04-01T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59456
published_at 2026-04-07T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-08T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-09T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59538
published_at 2026-04-11T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.59523
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-13T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59537
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59544
published_at 2026-04-18T12:55:00Z
11
value 0.0038
scoring_system epss
scoring_elements 0.59489
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2779
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url http://www.securityfocus.com/bid/103787
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568940
reference_id 1568940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568940
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2779
reference_id CVE-2018-2779
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2779
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:09Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2779
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yhz8-4u65-xqd6
60
url VCID-z183-g8nz-4kde
vulnerability_id VCID-z183-g8nz-4kde
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3081.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3081
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.3066
published_at 2026-04-21T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30684
published_at 2026-04-01T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30816
published_at 2026-04-02T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30864
published_at 2026-04-04T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30683
published_at 2026-04-07T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30741
published_at 2026-04-08T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30774
published_at 2026-04-09T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30777
published_at 2026-04-11T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30733
published_at 2026-04-12T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-13T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30711
published_at 2026-04-16T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30693
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
34
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
35
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html
36
reference_url https://security.netapp.com/advisory/ntap-20180726-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://security.netapp.com/advisory/ntap-20180726-0002/
37
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://www.debian.org/security/2018/dsa-4341
38
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
39
reference_url http://www.securityfocus.com/bid/104779
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url http://www.securityfocus.com/bid/104779
40
reference_url http://www.securitytracker.com/id/1041294
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url http://www.securitytracker.com/id/1041294
41
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602424
reference_id 1602424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602424
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3081
reference_id CVE-2018-3081
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:P/A:P
1
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-3081
58
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://access.redhat.com/errata/RHSA-2018:3655
59
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://access.redhat.com/errata/RHSA-2019:1258
60
reference_url https://access.redhat.com/errata/RHSA-2019:2327
reference_id RHSA-2019:2327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://access.redhat.com/errata/RHSA-2019:2327
61
reference_url https://usn.ubuntu.com/3725-1/
reference_id USN-3725-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://usn.ubuntu.com/3725-1/
62
reference_url https://usn.ubuntu.com/3725-2/
reference_id USN-3725-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T18:09:02Z/
url https://usn.ubuntu.com/3725-2/
fixed_packages
aliases CVE-2018-3081
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z183-g8nz-4kde
61
url VCID-zj4f-6f1c-5yhc
vulnerability_id VCID-zj4f-6f1c-5yhc
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2775.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2775
reference_id
reference_type
scores
0
value 0.00494
scoring_system epss
scoring_elements 0.65697
published_at 2026-04-02T12:55:00Z
1
value 0.00494
scoring_system epss
scoring_elements 0.65767
published_at 2026-04-21T12:55:00Z
2
value 0.00494
scoring_system epss
scoring_elements 0.65648
published_at 2026-04-01T12:55:00Z
3
value 0.00494
scoring_system epss
scoring_elements 0.65693
published_at 2026-04-07T12:55:00Z
4
value 0.00494
scoring_system epss
scoring_elements 0.65744
published_at 2026-04-08T12:55:00Z
5
value 0.00494
scoring_system epss
scoring_elements 0.65755
published_at 2026-04-09T12:55:00Z
6
value 0.00494
scoring_system epss
scoring_elements 0.65777
published_at 2026-04-11T12:55:00Z
7
value 0.00494
scoring_system epss
scoring_elements 0.65762
published_at 2026-04-12T12:55:00Z
8
value 0.00494
scoring_system epss
scoring_elements 0.65733
published_at 2026-04-13T12:55:00Z
9
value 0.00494
scoring_system epss
scoring_elements 0.65768
published_at 2026-04-16T12:55:00Z
10
value 0.00494
scoring_system epss
scoring_elements 0.65781
published_at 2026-04-18T12:55:00Z
11
value 0.00494
scoring_system epss
scoring_elements 0.65727
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2775
2
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
3
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
4
reference_url http://www.securityfocus.com/bid/103777
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url http://www.securityfocus.com/bid/103777
5
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url http://www.securitytracker.com/id/1040698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568934
reference_id 1568934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568934
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2775
reference_id CVE-2018-2775
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2775
12
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url https://access.redhat.com/errata/RHSA-2018:3655
13
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url https://usn.ubuntu.com/3629-1/
14
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:12Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2775
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zj4f-6f1c-5yhc
62
url VCID-zkvk-538h-w3b9
vulnerability_id VCID-zkvk-538h-w3b9
summary
Multiple vulnerabilities have been found in MariaDB and MySQL, the
    worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2817.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2817
reference_id
reference_type
scores
0
value 0.00265
scoring_system epss
scoring_elements 0.4998
published_at 2026-04-18T12:55:00Z
1
value 0.00265
scoring_system epss
scoring_elements 0.49883
published_at 2026-04-01T12:55:00Z
2
value 0.00265
scoring_system epss
scoring_elements 0.49921
published_at 2026-04-02T12:55:00Z
3
value 0.00265
scoring_system epss
scoring_elements 0.49949
published_at 2026-04-04T12:55:00Z
4
value 0.00265
scoring_system epss
scoring_elements 0.49899
published_at 2026-04-07T12:55:00Z
5
value 0.00265
scoring_system epss
scoring_elements 0.49953
published_at 2026-04-21T12:55:00Z
6
value 0.00265
scoring_system epss
scoring_elements 0.49946
published_at 2026-04-09T12:55:00Z
7
value 0.00265
scoring_system epss
scoring_elements 0.49965
published_at 2026-04-11T12:55:00Z
8
value 0.00265
scoring_system epss
scoring_elements 0.49936
published_at 2026-04-12T12:55:00Z
9
value 0.00265
scoring_system epss
scoring_elements 0.49934
published_at 2026-04-13T12:55:00Z
10
value 0.00265
scoring_system epss
scoring_elements 0.49979
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
38
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
39
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
40
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://www.debian.org/security/2018/dsa-4176
41
reference_url https://www.debian.org/security/2018/dsa-4341
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://www.debian.org/security/2018/dsa-4341
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
43
reference_url http://www.securityfocus.com/bid/103818
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url http://www.securityfocus.com/bid/103818
44
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url http://www.securitytracker.com/id/1040698
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568954
reference_id 1568954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568954
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2817
reference_id CVE-2018-2817
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2817
73
reference_url https://security.gentoo.org/glsa/201908-24
reference_id GLSA-201908-24
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://security.gentoo.org/glsa/201908-24
74
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:1254
75
reference_url https://access.redhat.com/errata/RHSA-2018:2439
reference_id RHSA-2018:2439
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:2439
76
reference_url https://access.redhat.com/errata/RHSA-2018:2729
reference_id RHSA-2018:2729
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:2729
77
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2018:3655
78
reference_url https://access.redhat.com/errata/RHSA-2019:1258
reference_id RHSA-2019:1258
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://access.redhat.com/errata/RHSA-2019:1258
79
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://usn.ubuntu.com/3629-1/
80
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://usn.ubuntu.com/3629-2/
81
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:25:54Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2817
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkvk-538h-w3b9
63
url VCID-zuxd-n3wn-s7hg
vulnerability_id VCID-zuxd-n3wn-s7hg
summary mysql: pid file can be created in a world-writeable directory (CPU Apr 2018)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2773.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2773.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2773
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12115
published_at 2026-04-11T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12127
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12108
published_at 2026-04-09T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12056
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.11974
published_at 2026-04-07T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12173
published_at 2026-04-04T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12014
published_at 2026-04-01T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12079
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12506
published_at 2026-04-21T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12483
published_at 2026-04-13T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-16T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.1239
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2773
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2773
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2818
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
13
reference_url https://security.netapp.com/advisory/ntap-20180419-0002/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://security.netapp.com/advisory/ntap-20180419-0002/
14
reference_url https://www.debian.org/security/2018/dsa-4176
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://www.debian.org/security/2018/dsa-4176
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
16
reference_url http://www.securityfocus.com/bid/103811
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url http://www.securityfocus.com/bid/103811
17
reference_url http://www.securitytracker.com/id/1040698
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url http://www.securitytracker.com/id/1040698
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568932
reference_id 1568932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568932
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2773
reference_id CVE-2018-2773
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2773
26
reference_url https://access.redhat.com/errata/RHSA-2018:1254
reference_id RHSA-2018:1254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://access.redhat.com/errata/RHSA-2018:1254
27
reference_url https://access.redhat.com/errata/RHSA-2018:3655
reference_id RHSA-2018:3655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://access.redhat.com/errata/RHSA-2018:3655
28
reference_url https://usn.ubuntu.com/3629-1/
reference_id USN-3629-1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://usn.ubuntu.com/3629-1/
29
reference_url https://usn.ubuntu.com/3629-2/
reference_id USN-3629-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://usn.ubuntu.com/3629-2/
30
reference_url https://usn.ubuntu.com/3629-3/
reference_id USN-3629-3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:26:02Z/
url https://usn.ubuntu.com/3629-3/
fixed_packages
aliases CVE-2018-2773
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zuxd-n3wn-s7hg
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql57-mysql@5.7.24-2%3Farch=el6