Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-z6dd-929s-n7cr
Summaryedk2: insufficient memory write in SMM service leads to privilege escalation
Aliases
0
alias CVE-2018-12182
Fixed_packages
0
url pkg:deb/debian/edk2@0?distro=trixie
purl pkg:deb/debian/edk2@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@0%3Fdistro=trixie
1
url pkg:deb/debian/edk2@2020.11-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/edk2@2020.11-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b7a9-w2fs-dbh7
1
vulnerability VCID-k7zd-s9nc-r3hb
2
vulnerability VCID-mg21-k76s-sqfp
3
vulnerability VCID-quq1-8rke-c3gf
4
vulnerability VCID-r48c-b4df-ffhx
5
vulnerability VCID-sd4b-3g4z-mubq
6
vulnerability VCID-z1gk-5f8t-tqau
7
vulnerability VCID-zd64-tjtu-sua3
8
vulnerability VCID-zwx2-8yhh-7yef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2020.11-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/edk2@2022.11-6%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/edk2@2022.11-6%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b7a9-w2fs-dbh7
1
vulnerability VCID-k7zd-s9nc-r3hb
2
vulnerability VCID-mg21-k76s-sqfp
3
vulnerability VCID-quq1-8rke-c3gf
4
vulnerability VCID-r48c-b4df-ffhx
5
vulnerability VCID-sd4b-3g4z-mubq
6
vulnerability VCID-z1gk-5f8t-tqau
7
vulnerability VCID-zd64-tjtu-sua3
8
vulnerability VCID-zwx2-8yhh-7yef
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2022.11-6%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/edk2@2025.02-8%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/edk2@2025.02-8%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd64-tjtu-sua3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.02-8%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/edk2@2025.02-9?distro=trixie
purl pkg:deb/debian/edk2@2025.02-9?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zd64-tjtu-sua3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.02-9%3Fdistro=trixie
5
url pkg:deb/debian/edk2@2025.11-4?distro=trixie
purl pkg:deb/debian/edk2@2025.11-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.11-4%3Fdistro=trixie
6
url pkg:deb/debian/edk2@2025.11-5?distro=trixie
purl pkg:deb/debian/edk2@2025.11-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/edk2@2025.11-5%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12182.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12182
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26389
published_at 2026-04-01T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26287
published_at 2026-04-16T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.2634
published_at 2026-04-12T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26281
published_at 2026-04-13T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.2644
published_at 2026-04-02T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26484
published_at 2026-04-04T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26258
published_at 2026-04-07T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26326
published_at 2026-04-08T12:55:00Z
8
value 0.00095
scoring_system epss
scoring_elements 0.26377
published_at 2026-04-09T12:55:00Z
9
value 0.00095
scoring_system epss
scoring_elements 0.26386
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12182
2
reference_url https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html
reference_id
reference_type
scores
url https://edk2-docs.gitbooks.io/security-advisory/content/sw-smi-confused-deputy-smramsavestate_c.html
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TQYVZRFEXSN3KS43AVH4D7QX553EZQYP/
4
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03912en_us
5
reference_url http://www.securityfocus.com/bid/107648
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107648
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1694081
reference_id 1694081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1694081
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tianocore:edk_ii:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tianocore:edk_ii:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tianocore:edk_ii:-:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12182
reference_id CVE-2018-12182
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12182
9
reference_url https://usn.ubuntu.com/6920-1/
reference_id USN-6920-1
reference_type
scores
url https://usn.ubuntu.com/6920-1/
Weaknesses
0
cwe_id 119
name Improper Restriction of Operations within the Bounds of a Memory Buffer
description The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
1
cwe_id 284
name Improper Access Control
description The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
2
cwe_id 441
name Unintended Proxy or Intermediary ('Confused Deputy')
description The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.
Exploits
Severity_range_score4.6 - 6.7
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-z6dd-929s-n7cr