Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-n54z-r9zz-tkee
SummaryJDK: missing null check when accelerating Unsafe calls
Aliases
0
alias CVE-2018-12549
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.30-1jpp.1?arch=el6_10
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.30-1jpp.1?arch=el6_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2eke-m7j3-1qc5
1
vulnerability VCID-73ad-ngrz-6uee
2
vulnerability VCID-7g71-5e73-wbdm
3
vulnerability VCID-83wv-cnn4-a7he
4
vulnerability VCID-n54z-r9zz-tkee
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.30-1jpp.1%3Farch=el6_10
1
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.30-1jpp.1?arch=el7
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.30-1jpp.1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2eke-m7j3-1qc5
1
vulnerability VCID-73ad-ngrz-6uee
2
vulnerability VCID-7g71-5e73-wbdm
3
vulnerability VCID-83wv-cnn4-a7he
4
vulnerability VCID-n54z-r9zz-tkee
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.30-1jpp.1%3Farch=el7
2
url pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.35-3?arch=el8_0
purl pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.35-3?arch=el8_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2eke-m7j3-1qc5
1
vulnerability VCID-6mq4-munv-sffc
2
vulnerability VCID-73ad-ngrz-6uee
3
vulnerability VCID-7g71-5e73-wbdm
4
vulnerability VCID-83wv-cnn4-a7he
5
vulnerability VCID-k87f-hwsu-pycr
6
vulnerability VCID-kptw-3u1d-3ugk
7
vulnerability VCID-msra-64g9-huah
8
vulnerability VCID-n54z-r9zz-tkee
9
vulnerability VCID-s36j-5xfr-8qhk
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.35-3%3Farch=el8_0
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12549.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12549
reference_id
reference_type
scores
0
value 0.00719
scoring_system epss
scoring_elements 0.7241
published_at 2026-04-07T12:55:00Z
1
value 0.00719
scoring_system epss
scoring_elements 0.72507
published_at 2026-04-18T12:55:00Z
2
value 0.00719
scoring_system epss
scoring_elements 0.72457
published_at 2026-04-13T12:55:00Z
3
value 0.00719
scoring_system epss
scoring_elements 0.72499
published_at 2026-04-16T12:55:00Z
4
value 0.00719
scoring_system epss
scoring_elements 0.72415
published_at 2026-04-02T12:55:00Z
5
value 0.00719
scoring_system epss
scoring_elements 0.72433
published_at 2026-04-04T12:55:00Z
6
value 0.00719
scoring_system epss
scoring_elements 0.72449
published_at 2026-04-08T12:55:00Z
7
value 0.00719
scoring_system epss
scoring_elements 0.72461
published_at 2026-04-09T12:55:00Z
8
value 0.00719
scoring_system epss
scoring_elements 0.72484
published_at 2026-04-11T12:55:00Z
9
value 0.00719
scoring_system epss
scoring_elements 0.72467
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12549
2
reference_url https://bugs.eclipse.org/bugs/show_bug.cgi?id=544019
reference_id
reference_type
scores
url https://bugs.eclipse.org/bugs/show_bug.cgi?id=544019
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1685717
reference_id 1685717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1685717
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:openj9:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:eclipse:openj9:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eclipse:openj9:0.11.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12549
reference_id CVE-2018-12549
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12549
13
reference_url https://access.redhat.com/errata/RHSA-2019:0469
reference_id RHSA-2019:0469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0469
14
reference_url https://access.redhat.com/errata/RHSA-2019:0472
reference_id RHSA-2019:0472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0472
15
reference_url https://access.redhat.com/errata/RHSA-2019:0640
reference_id RHSA-2019:0640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0640
16
reference_url https://access.redhat.com/errata/RHSA-2019:1238
reference_id RHSA-2019:1238
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1238
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 111
name Direct Use of Unsafe JNI
description When a Java application uses the Java Native Interface (JNI) to call code written in another programming language, it can expose the application to weaknesses in that code, even if those weaknesses cannot occur in Java.
Exploits
Severity_range_score7.5 - 9.8
Exploitability0.5
Weighted_severity8.8
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-n54z-r9zz-tkee