Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel-alt@4.14.0-115?arch=el7a
Typerpm
Namespaceredhat
Namekernel-alt
Version4.14.0-115
Qualifiers
arch el7a
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1ff6-2afc-fqcd
vulnerability_id VCID-1ff6-2afc-fqcd
summary kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14641.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14641.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14641
reference_id
reference_type
scores
0
value 0.01355
scoring_system epss
scoring_elements 0.80076
published_at 2026-04-01T12:55:00Z
1
value 0.01355
scoring_system epss
scoring_elements 0.80083
published_at 2026-04-02T12:55:00Z
2
value 0.01355
scoring_system epss
scoring_elements 0.80104
published_at 2026-04-04T12:55:00Z
3
value 0.01355
scoring_system epss
scoring_elements 0.80092
published_at 2026-04-07T12:55:00Z
4
value 0.01355
scoring_system epss
scoring_elements 0.80121
published_at 2026-04-08T12:55:00Z
5
value 0.01355
scoring_system epss
scoring_elements 0.80128
published_at 2026-04-09T12:55:00Z
6
value 0.01355
scoring_system epss
scoring_elements 0.80147
published_at 2026-04-11T12:55:00Z
7
value 0.01355
scoring_system epss
scoring_elements 0.80131
published_at 2026-04-12T12:55:00Z
8
value 0.01355
scoring_system epss
scoring_elements 0.80123
published_at 2026-04-13T12:55:00Z
9
value 0.01355
scoring_system epss
scoring_elements 0.80152
published_at 2026-04-16T12:55:00Z
10
value 0.01355
scoring_system epss
scoring_elements 0.80153
published_at 2026-04-18T12:55:00Z
11
value 0.01355
scoring_system epss
scoring_elements 0.80156
published_at 2026-04-21T12:55:00Z
12
value 0.01355
scoring_system epss
scoring_elements 0.80184
published_at 2026-04-24T12:55:00Z
13
value 0.01355
scoring_system epss
scoring_elements 0.80191
published_at 2026-04-26T12:55:00Z
14
value 0.01355
scoring_system epss
scoring_elements 0.80205
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14641
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1629636
reference_id 1629636
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1629636
3
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
fixed_packages
aliases CVE-2018-14641
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ff6-2afc-fqcd
1
url VCID-4tc5-gj85-kfag
vulnerability_id VCID-4tc5-gj85-kfag
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
1
reference_url http://openwall.com/lists/oss-security/2018/07/13/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/07/13/2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13405.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13405.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-13405
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.34786
published_at 2026-04-29T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.3519
published_at 2026-04-16T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35127
published_at 2026-04-21T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.34893
published_at 2026-04-24T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-26T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37659
published_at 2026-04-04T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37589
published_at 2026-04-08T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37602
published_at 2026-04-09T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37616
published_at 2026-04-11T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37582
published_at 2026-04-12T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37554
published_at 2026-04-13T12:55:00Z
12
value 0.00165
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-01T12:55:00Z
13
value 0.00165
scoring_system epss
scoring_elements 0.37635
published_at 2026-04-02T12:55:00Z
14
value 0.00165
scoring_system epss
scoring_elements 0.37537
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-13405
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=0b3369840cd61c23e2b9241093737b4c395cb406
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=0b3369840cd61c23e2b9241093737b4c395cb406
9
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRBNBX73SAFKQWBOX76SLMWPTKJPVGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRBNBX73SAFKQWBOX76SLMWPTKJPVGEJ/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKKIAUMR5FAYLZ7HLEPOXMKAAE3BYBQ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKKIAUMR5FAYLZ7HLEPOXMKAAE3BYBQ/
12
reference_url https://support.f5.com/csp/article/K00854051
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K00854051
13
reference_url https://twitter.com/grsecurity/status/1015082951204327425
reference_id
reference_type
scores
url https://twitter.com/grsecurity/status/1015082951204327425
14
reference_url https://www.debian.org/security/2018/dsa-4266
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4266
15
reference_url https://www.exploit-db.com/exploits/45033/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/45033/
16
reference_url http://www.securityfocus.com/bid/106503
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106503
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1599161
reference_id 1599161
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1599161
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
84
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1611
reference_id CVE-2018-13405
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1611
85
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45033.c
reference_id CVE-2018-13405
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45033.c
86
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-13405
reference_id CVE-2018-13405
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-13405
87
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
88
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
89
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
90
reference_url https://access.redhat.com/errata/RHSA-2019:0717
reference_id RHSA-2019:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0717
91
reference_url https://access.redhat.com/errata/RHSA-2019:2476
reference_id RHSA-2019:2476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2476
92
reference_url https://access.redhat.com/errata/RHSA-2019:2566
reference_id RHSA-2019:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2566
93
reference_url https://access.redhat.com/errata/RHSA-2019:2696
reference_id RHSA-2019:2696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2696
94
reference_url https://access.redhat.com/errata/RHSA-2019:2730
reference_id RHSA-2019:2730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2730
95
reference_url https://access.redhat.com/errata/RHSA-2019:4159
reference_id RHSA-2019:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4159
96
reference_url https://access.redhat.com/errata/RHSA-2019:4164
reference_id RHSA-2019:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4164
97
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
98
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
99
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
100
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
101
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
102
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-13405
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4tc5-gj85-kfag
2
url VCID-683b-87c7-93a5
vulnerability_id VCID-683b-87c7-93a5
summary kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18208.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18208
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15694
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15796
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15602
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15687
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15746
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15713
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15678
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15613
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.1554
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15549
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15642
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.1564
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15583
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551565
reference_id 1551565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551565
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://access.redhat.com/errata/RHSA-2019:3967
reference_id RHSA-2019:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3967
9
reference_url https://access.redhat.com/errata/RHSA-2019:4057
reference_id RHSA-2019:4057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4057
10
reference_url https://access.redhat.com/errata/RHSA-2019:4058
reference_id RHSA-2019:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4058
11
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
12
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
13
reference_url https://usn.ubuntu.com/3653-1/
reference_id USN-3653-1
reference_type
scores
url https://usn.ubuntu.com/3653-1/
14
reference_url https://usn.ubuntu.com/3653-2/
reference_id USN-3653-2
reference_type
scores
url https://usn.ubuntu.com/3653-2/
15
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
16
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
17
reference_url https://usn.ubuntu.com/3657-1/
reference_id USN-3657-1
reference_type
scores
url https://usn.ubuntu.com/3657-1/
fixed_packages
aliases CVE-2017-18208
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-683b-87c7-93a5
3
url VCID-68jc-asgq-1kg9
vulnerability_id VCID-68jc-asgq-1kg9
summary kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10322.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10322
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15962
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15864
published_at 2026-04-29T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15888
published_at 2026-04-21T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-24T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15899
published_at 2026-04-26T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16032
published_at 2026-04-02T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16094
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15887
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15972
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16035
published_at 2026-04-09T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.16012
published_at 2026-04-11T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15974
published_at 2026-04-12T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15906
published_at 2026-04-13T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-16T12:55:00Z
14
value 0.00051
scoring_system epss
scoring_elements 0.15843
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10322
2
reference_url https://bugzilla.kernel.org/show_bug.cgi?id=199377
reference_id
reference_type
scores
url https://bugzilla.kernel.org/show_bug.cgi?id=199377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.spinics.net/lists/linux-xfs/msg17215.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/linux-xfs/msg17215.html
6
reference_url http://www.securityfocus.com/bid/103960
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103960
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1571623
reference_id 1571623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1571623
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10322
reference_id CVE-2018-10322
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10322
14
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
15
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
16
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
17
reference_url https://usn.ubuntu.com/4578-1/
reference_id USN-4578-1
reference_type
scores
url https://usn.ubuntu.com/4578-1/
18
reference_url https://usn.ubuntu.com/4579-1/
reference_id USN-4579-1
reference_type
scores
url https://usn.ubuntu.com/4579-1/
fixed_packages
aliases CVE-2018-10322
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68jc-asgq-1kg9
4
url VCID-6ytv-3taq-nuhc
vulnerability_id VCID-6ytv-3taq-nuhc
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17805.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17805.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17805
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05922
published_at 2026-04-29T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05739
published_at 2026-04-11T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05732
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05726
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-16T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05693
published_at 2026-04-18T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05842
published_at 2026-04-21T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05875
published_at 2026-04-24T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05911
published_at 2026-04-26T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05663
published_at 2026-04-02T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05703
published_at 2026-04-04T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-07T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05735
published_at 2026-04-08T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05762
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17805
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
29
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
30
reference_url https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
31
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
32
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
33
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
34
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
35
reference_url http://www.securityfocus.com/bid/102291
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102291
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1528312
reference_id 1528312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1528312
37
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
38
reference_url https://security.archlinux.org/ASA-201801-2
reference_id ASA-201801-2
reference_type
scores
url https://security.archlinux.org/ASA-201801-2
39
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
40
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
41
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
42
reference_url https://security.archlinux.org/AVG-561
reference_id AVG-561
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-561
43
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
44
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17805
reference_id CVE-2017-17805
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17805
62
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
63
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
64
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
65
reference_url https://access.redhat.com/errata/RHSA-2019:2473
reference_id RHSA-2019:2473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2473
66
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
67
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
68
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
69
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
70
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
71
reference_url https://usn.ubuntu.com/3620-1/
reference_id USN-3620-1
reference_type
scores
url https://usn.ubuntu.com/3620-1/
72
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
url https://usn.ubuntu.com/3620-2/
73
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-17805
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ytv-3taq-nuhc
5
url VCID-75hg-p8uc-p7ex
vulnerability_id VCID-75hg-p8uc-p7ex
summary Speculative Store Bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3639
reference_id
reference_type
scores
0
value 0.39422
scoring_system epss
scoring_elements 0.97277
published_at 2026-04-02T12:55:00Z
1
value 0.39422
scoring_system epss
scoring_elements 0.97282
published_at 2026-04-04T12:55:00Z
2
value 0.39422
scoring_system epss
scoring_elements 0.97272
published_at 2026-04-01T12:55:00Z
3
value 0.46015
scoring_system epss
scoring_elements 0.97629
published_at 2026-04-11T12:55:00Z
4
value 0.46015
scoring_system epss
scoring_elements 0.97631
published_at 2026-04-12T12:55:00Z
5
value 0.46015
scoring_system epss
scoring_elements 0.97632
published_at 2026-04-13T12:55:00Z
6
value 0.46015
scoring_system epss
scoring_elements 0.97639
published_at 2026-04-16T12:55:00Z
7
value 0.46015
scoring_system epss
scoring_elements 0.97642
published_at 2026-04-26T12:55:00Z
8
value 0.46015
scoring_system epss
scoring_elements 0.97641
published_at 2026-04-24T12:55:00Z
9
value 0.46015
scoring_system epss
scoring_elements 0.97647
published_at 2026-04-29T12:55:00Z
10
value 0.46015
scoring_system epss
scoring_elements 0.97619
published_at 2026-04-07T12:55:00Z
11
value 0.46015
scoring_system epss
scoring_elements 0.97624
published_at 2026-04-08T12:55:00Z
12
value 0.46015
scoring_system epss
scoring_elements 0.97627
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3639
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566890
reference_id 1566890
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566890
6
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
reference_id CVE-2018-3639
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c
reference_id CVE-2018-3639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c
8
reference_url https://access.redhat.com/errata/RHSA-2018:1629
reference_id RHSA-2018:1629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1629
9
reference_url https://access.redhat.com/errata/RHSA-2018:1630
reference_id RHSA-2018:1630
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1630
10
reference_url https://access.redhat.com/errata/RHSA-2018:1632
reference_id RHSA-2018:1632
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1632
11
reference_url https://access.redhat.com/errata/RHSA-2018:1633
reference_id RHSA-2018:1633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1633
12
reference_url https://access.redhat.com/errata/RHSA-2018:1635
reference_id RHSA-2018:1635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1635
13
reference_url https://access.redhat.com/errata/RHSA-2018:1636
reference_id RHSA-2018:1636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1636
14
reference_url https://access.redhat.com/errata/RHSA-2018:1637
reference_id RHSA-2018:1637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1637
15
reference_url https://access.redhat.com/errata/RHSA-2018:1638
reference_id RHSA-2018:1638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1638
16
reference_url https://access.redhat.com/errata/RHSA-2018:1639
reference_id RHSA-2018:1639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1639
17
reference_url https://access.redhat.com/errata/RHSA-2018:1640
reference_id RHSA-2018:1640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1640
18
reference_url https://access.redhat.com/errata/RHSA-2018:1641
reference_id RHSA-2018:1641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1641
19
reference_url https://access.redhat.com/errata/RHSA-2018:1642
reference_id RHSA-2018:1642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1642
20
reference_url https://access.redhat.com/errata/RHSA-2018:1643
reference_id RHSA-2018:1643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1643
21
reference_url https://access.redhat.com/errata/RHSA-2018:1644
reference_id RHSA-2018:1644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1644
22
reference_url https://access.redhat.com/errata/RHSA-2018:1645
reference_id RHSA-2018:1645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1645
23
reference_url https://access.redhat.com/errata/RHSA-2018:1646
reference_id RHSA-2018:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1646
24
reference_url https://access.redhat.com/errata/RHSA-2018:1647
reference_id RHSA-2018:1647
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1647
25
reference_url https://access.redhat.com/errata/RHSA-2018:1648
reference_id RHSA-2018:1648
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1648
26
reference_url https://access.redhat.com/errata/RHSA-2018:1649
reference_id RHSA-2018:1649
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1649
27
reference_url https://access.redhat.com/errata/RHSA-2018:1650
reference_id RHSA-2018:1650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1650
28
reference_url https://access.redhat.com/errata/RHSA-2018:1651
reference_id RHSA-2018:1651
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1651
29
reference_url https://access.redhat.com/errata/RHSA-2018:1652
reference_id RHSA-2018:1652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1652
30
reference_url https://access.redhat.com/errata/RHSA-2018:1653
reference_id RHSA-2018:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1653
31
reference_url https://access.redhat.com/errata/RHSA-2018:1654
reference_id RHSA-2018:1654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1654
32
reference_url https://access.redhat.com/errata/RHSA-2018:1655
reference_id RHSA-2018:1655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1655
33
reference_url https://access.redhat.com/errata/RHSA-2018:1656
reference_id RHSA-2018:1656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1656
34
reference_url https://access.redhat.com/errata/RHSA-2018:1657
reference_id RHSA-2018:1657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1657
35
reference_url https://access.redhat.com/errata/RHSA-2018:1658
reference_id RHSA-2018:1658
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1658
36
reference_url https://access.redhat.com/errata/RHSA-2018:1659
reference_id RHSA-2018:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1659
37
reference_url https://access.redhat.com/errata/RHSA-2018:1660
reference_id RHSA-2018:1660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1660
38
reference_url https://access.redhat.com/errata/RHSA-2018:1661
reference_id RHSA-2018:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1661
39
reference_url https://access.redhat.com/errata/RHSA-2018:1662
reference_id RHSA-2018:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1662
40
reference_url https://access.redhat.com/errata/RHSA-2018:1663
reference_id RHSA-2018:1663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1663
41
reference_url https://access.redhat.com/errata/RHSA-2018:1664
reference_id RHSA-2018:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1664
42
reference_url https://access.redhat.com/errata/RHSA-2018:1665
reference_id RHSA-2018:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1665
43
reference_url https://access.redhat.com/errata/RHSA-2018:1666
reference_id RHSA-2018:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1666
44
reference_url https://access.redhat.com/errata/RHSA-2018:1667
reference_id RHSA-2018:1667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1667
45
reference_url https://access.redhat.com/errata/RHSA-2018:1668
reference_id RHSA-2018:1668
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1668
46
reference_url https://access.redhat.com/errata/RHSA-2018:1669
reference_id RHSA-2018:1669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1669
47
reference_url https://access.redhat.com/errata/RHSA-2018:1674
reference_id RHSA-2018:1674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1674
48
reference_url https://access.redhat.com/errata/RHSA-2018:1675
reference_id RHSA-2018:1675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1675
49
reference_url https://access.redhat.com/errata/RHSA-2018:1676
reference_id RHSA-2018:1676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1676
50
reference_url https://access.redhat.com/errata/RHSA-2018:1686
reference_id RHSA-2018:1686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1686
51
reference_url https://access.redhat.com/errata/RHSA-2018:1688
reference_id RHSA-2018:1688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1688
52
reference_url https://access.redhat.com/errata/RHSA-2018:1689
reference_id RHSA-2018:1689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1689
53
reference_url https://access.redhat.com/errata/RHSA-2018:1690
reference_id RHSA-2018:1690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1690
54
reference_url https://access.redhat.com/errata/RHSA-2018:1696
reference_id RHSA-2018:1696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1696
55
reference_url https://access.redhat.com/errata/RHSA-2018:1710
reference_id RHSA-2018:1710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1710
56
reference_url https://access.redhat.com/errata/RHSA-2018:1711
reference_id RHSA-2018:1711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1711
57
reference_url https://access.redhat.com/errata/RHSA-2018:1737
reference_id RHSA-2018:1737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1737
58
reference_url https://access.redhat.com/errata/RHSA-2018:1738
reference_id RHSA-2018:1738
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1738
59
reference_url https://access.redhat.com/errata/RHSA-2018:1826
reference_id RHSA-2018:1826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1826
60
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
61
reference_url https://access.redhat.com/errata/RHSA-2018:1965
reference_id RHSA-2018:1965
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1965
62
reference_url https://access.redhat.com/errata/RHSA-2018:1967
reference_id RHSA-2018:1967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1967
63
reference_url https://access.redhat.com/errata/RHSA-2018:1997
reference_id RHSA-2018:1997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1997
64
reference_url https://access.redhat.com/errata/RHSA-2018:2001
reference_id RHSA-2018:2001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2001
65
reference_url https://access.redhat.com/errata/RHSA-2018:2003
reference_id RHSA-2018:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2003
66
reference_url https://access.redhat.com/errata/RHSA-2018:2006
reference_id RHSA-2018:2006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2006
67
reference_url https://access.redhat.com/errata/RHSA-2018:2060
reference_id RHSA-2018:2060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2060
68
reference_url https://access.redhat.com/errata/RHSA-2018:2161
reference_id RHSA-2018:2161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2161
69
reference_url https://access.redhat.com/errata/RHSA-2018:2162
reference_id RHSA-2018:2162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2162
70
reference_url https://access.redhat.com/errata/RHSA-2018:2164
reference_id RHSA-2018:2164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2164
71
reference_url https://access.redhat.com/errata/RHSA-2018:2171
reference_id RHSA-2018:2171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2171
72
reference_url https://access.redhat.com/errata/RHSA-2018:2172
reference_id RHSA-2018:2172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2172
73
reference_url https://access.redhat.com/errata/RHSA-2018:2216
reference_id RHSA-2018:2216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2216
74
reference_url https://access.redhat.com/errata/RHSA-2018:2228
reference_id RHSA-2018:2228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2228
75
reference_url https://access.redhat.com/errata/RHSA-2018:2246
reference_id RHSA-2018:2246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2246
76
reference_url https://access.redhat.com/errata/RHSA-2018:2250
reference_id RHSA-2018:2250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2250
77
reference_url https://access.redhat.com/errata/RHSA-2018:2258
reference_id RHSA-2018:2258
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2258
78
reference_url https://access.redhat.com/errata/RHSA-2018:2289
reference_id RHSA-2018:2289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2289
79
reference_url https://access.redhat.com/errata/RHSA-2018:2309
reference_id RHSA-2018:2309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2309
80
reference_url https://access.redhat.com/errata/RHSA-2018:2328
reference_id RHSA-2018:2328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2328
81
reference_url https://access.redhat.com/errata/RHSA-2018:2363
reference_id RHSA-2018:2363
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2363
82
reference_url https://access.redhat.com/errata/RHSA-2018:2364
reference_id RHSA-2018:2364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2364
83
reference_url https://access.redhat.com/errata/RHSA-2018:2387
reference_id RHSA-2018:2387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2387
84
reference_url https://access.redhat.com/errata/RHSA-2018:2394
reference_id RHSA-2018:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2394
85
reference_url https://access.redhat.com/errata/RHSA-2018:2396
reference_id RHSA-2018:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2396
86
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
87
reference_url https://access.redhat.com/errata/RHSA-2018:3396
reference_id RHSA-2018:3396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3396
88
reference_url https://access.redhat.com/errata/RHSA-2018:3397
reference_id RHSA-2018:3397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3397
89
reference_url https://access.redhat.com/errata/RHSA-2018:3398
reference_id RHSA-2018:3398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3398
90
reference_url https://access.redhat.com/errata/RHSA-2018:3399
reference_id RHSA-2018:3399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3399
91
reference_url https://access.redhat.com/errata/RHSA-2018:3400
reference_id RHSA-2018:3400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3400
92
reference_url https://access.redhat.com/errata/RHSA-2018:3401
reference_id RHSA-2018:3401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3401
93
reference_url https://access.redhat.com/errata/RHSA-2018:3402
reference_id RHSA-2018:3402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3402
94
reference_url https://access.redhat.com/errata/RHSA-2018:3407
reference_id RHSA-2018:3407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3407
95
reference_url https://access.redhat.com/errata/RHSA-2018:3423
reference_id RHSA-2018:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3423
96
reference_url https://access.redhat.com/errata/RHSA-2018:3424
reference_id RHSA-2018:3424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3424
97
reference_url https://access.redhat.com/errata/RHSA-2018:3425
reference_id RHSA-2018:3425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3425
98
reference_url https://access.redhat.com/errata/RHSA-2019:0148
reference_id RHSA-2019:0148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0148
99
reference_url https://access.redhat.com/errata/RHSA-2019:1046
reference_id RHSA-2019:1046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1046
100
reference_url https://usn.ubuntu.com/3651-1/
reference_id USN-3651-1
reference_type
scores
url https://usn.ubuntu.com/3651-1/
101
reference_url https://usn.ubuntu.com/3652-1/
reference_id USN-3652-1
reference_type
scores
url https://usn.ubuntu.com/3652-1/
102
reference_url https://usn.ubuntu.com/3653-1/
reference_id USN-3653-1
reference_type
scores
url https://usn.ubuntu.com/3653-1/
103
reference_url https://usn.ubuntu.com/3653-2/
reference_id USN-3653-2
reference_type
scores
url https://usn.ubuntu.com/3653-2/
104
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
105
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
106
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
107
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
108
reference_url https://usn.ubuntu.com/3679-1/
reference_id USN-3679-1
reference_type
scores
url https://usn.ubuntu.com/3679-1/
109
reference_url https://usn.ubuntu.com/3680-1/
reference_id USN-3680-1
reference_type
scores
url https://usn.ubuntu.com/3680-1/
110
reference_url https://usn.ubuntu.com/3756-1/
reference_id USN-3756-1
reference_type
scores
url https://usn.ubuntu.com/3756-1/
111
reference_url https://usn.ubuntu.com/3777-3/
reference_id USN-3777-3
reference_type
scores
url https://usn.ubuntu.com/3777-3/
112
reference_url https://xenbits.xen.org/xsa/advisory-263.html
reference_id XSA-263
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-263.html
fixed_packages
aliases CVE-2018-3639, XSA-263
risk_score 10.0
exploitability 2.0
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75hg-p8uc-p7ex
6
url VCID-8cg6-6bev-6bbq
vulnerability_id VCID-8cg6-6bev-6bbq
summary kernel: crash (possible privesc) in kernel crypto api.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14619.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14619
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15605
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15648
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15713
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15514
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.156
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15655
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15622
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15587
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15523
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15449
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15455
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15509
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15546
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15545
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.1549
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14619
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14619
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622004
reference_id 1622004
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622004
4
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
fixed_packages
aliases CVE-2018-14619
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cg6-6bev-6bbq
7
url VCID-8mtc-a6et-4fd5
vulnerability_id VCID-8mtc-a6et-4fd5
summary kernel: stack-out-of-bounds write infs/jbd2/transaction.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10882.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10882
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19322
published_at 2026-04-01T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19456
published_at 2026-04-02T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19504
published_at 2026-04-04T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19221
published_at 2026-04-07T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19299
published_at 2026-04-08T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19352
published_at 2026-04-09T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19355
published_at 2026-04-11T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19306
published_at 2026-04-12T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19252
published_at 2026-04-13T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19213
published_at 2026-04-16T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.19222
published_at 2026-04-18T12:55:00Z
11
value 0.00062
scoring_system epss
scoring_elements 0.19236
published_at 2026-04-21T12:55:00Z
12
value 0.00062
scoring_system epss
scoring_elements 0.19134
published_at 2026-04-24T12:55:00Z
13
value 0.00062
scoring_system epss
scoring_elements 0.19124
published_at 2026-04-26T12:55:00Z
14
value 0.00062
scoring_system epss
scoring_elements 0.1908
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10882
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596842
reference_id 1596842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596842
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
7
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
8
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
9
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
10
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
11
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10882
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8mtc-a6et-4fd5
8
url VCID-8sj2-vr7p-7qgs
vulnerability_id VCID-8sj2-vr7p-7qgs
summary kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10940.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10940.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10940
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17377
published_at 2026-04-16T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.1724
published_at 2026-04-29T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17418
published_at 2026-04-21T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17326
published_at 2026-04-24T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17305
published_at 2026-04-26T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17544
published_at 2026-04-02T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.1759
published_at 2026-04-04T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17372
published_at 2026-04-07T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17463
published_at 2026-04-08T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17523
published_at 2026-04-09T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17536
published_at 2026-04-11T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17487
published_at 2026-04-12T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17434
published_at 2026-04-13T12:55:00Z
13
value 0.00056
scoring_system epss
scoring_elements 0.17386
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10940
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
6
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
9
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
10
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
11
reference_url http://www.securityfocus.com/bid/104154
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104154
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1577408
reference_id 1577408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1577408
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10940
reference_id CVE-2018-10940
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10940
16
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
17
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
18
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
19
reference_url https://usn.ubuntu.com/3676-1/
reference_id USN-3676-1
reference_type
scores
url https://usn.ubuntu.com/3676-1/
20
reference_url https://usn.ubuntu.com/3676-2/
reference_id USN-3676-2
reference_type
scores
url https://usn.ubuntu.com/3676-2/
21
reference_url https://usn.ubuntu.com/3695-1/
reference_id USN-3695-1
reference_type
scores
url https://usn.ubuntu.com/3695-1/
22
reference_url https://usn.ubuntu.com/3695-2/
reference_id USN-3695-2
reference_type
scores
url https://usn.ubuntu.com/3695-2/
23
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-10940
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sj2-vr7p-7qgs
9
url VCID-95yf-d643-jkhr
vulnerability_id VCID-95yf-d643-jkhr
summary kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10883.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10883
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15424
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15464
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15533
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15333
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15421
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15432
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15393
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15328
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15247
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15251
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15302
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15342
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15339
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15284
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596846
reference_id 1596846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596846
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
9
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
10
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
11
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
12
reference_url https://usn.ubuntu.com/3879-1/
reference_id USN-3879-1
reference_type
scores
url https://usn.ubuntu.com/3879-1/
13
reference_url https://usn.ubuntu.com/3879-2/
reference_id USN-3879-2
reference_type
scores
url https://usn.ubuntu.com/3879-2/
fixed_packages
aliases CVE-2018-10883
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95yf-d643-jkhr
10
url VCID-9p4a-gszq-s3aa
vulnerability_id VCID-9p4a-gszq-s3aa
summary kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10881.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10881
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15112
published_at 2026-04-01T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15152
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.1522
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15024
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15111
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15163
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15131
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15092
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15032
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14927
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14937
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.1499
published_at 2026-04-21T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15028
published_at 2026-04-24T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15031
published_at 2026-04-26T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.14973
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596828
reference_id 1596828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596828
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
9
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
10
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
11
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
12
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
13
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-10881
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9p4a-gszq-s3aa
11
url VCID-9ygm-tdws-wfgq
vulnerability_id VCID-9ygm-tdws-wfgq
summary kernel: stack-out-of-bounds write in ext4_update_inline_data function
references
0
reference_url http://patchwork.ozlabs.org/patch/930639/
reference_id
reference_type
scores
url http://patchwork.ozlabs.org/patch/930639/
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10880.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10880.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10880
reference_id
reference_type
scores
0
value 0.00946
scoring_system epss
scoring_elements 0.76266
published_at 2026-04-01T12:55:00Z
1
value 0.00946
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-29T12:55:00Z
2
value 0.00946
scoring_system epss
scoring_elements 0.76372
published_at 2026-04-18T12:55:00Z
3
value 0.00946
scoring_system epss
scoring_elements 0.76356
published_at 2026-04-21T12:55:00Z
4
value 0.00946
scoring_system epss
scoring_elements 0.7639
published_at 2026-04-24T12:55:00Z
5
value 0.00946
scoring_system epss
scoring_elements 0.76397
published_at 2026-04-26T12:55:00Z
6
value 0.00946
scoring_system epss
scoring_elements 0.7627
published_at 2026-04-02T12:55:00Z
7
value 0.00946
scoring_system epss
scoring_elements 0.763
published_at 2026-04-04T12:55:00Z
8
value 0.00946
scoring_system epss
scoring_elements 0.7628
published_at 2026-04-07T12:55:00Z
9
value 0.00946
scoring_system epss
scoring_elements 0.76313
published_at 2026-04-08T12:55:00Z
10
value 0.00946
scoring_system epss
scoring_elements 0.76327
published_at 2026-04-09T12:55:00Z
11
value 0.00946
scoring_system epss
scoring_elements 0.76354
published_at 2026-04-11T12:55:00Z
12
value 0.00946
scoring_system epss
scoring_elements 0.76332
published_at 2026-04-12T12:55:00Z
13
value 0.00946
scoring_system epss
scoring_elements 0.76328
published_at 2026-04-13T12:55:00Z
14
value 0.00946
scoring_system epss
scoring_elements 0.76368
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10880
3
reference_url https://bugzilla.kernel.org/show_bug.cgi?id=200005
reference_id
reference_type
scores
url https://bugzilla.kernel.org/show_bug.cgi?id=200005
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
8
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
9
reference_url http://www.securityfocus.com/bid/104907
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104907
10
reference_url http://www.securityfocus.com/bid/106503
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106503
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596812
reference_id 1596812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596812
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10880
reference_id CVE-2018-10880
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10880
19
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
20
reference_url https://usn.ubuntu.com/3821-1/
reference_id USN-3821-1
reference_type
scores
url https://usn.ubuntu.com/3821-1/
21
reference_url https://usn.ubuntu.com/3821-2/
reference_id USN-3821-2
reference_type
scores
url https://usn.ubuntu.com/3821-2/
22
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
23
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
24
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
25
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10880
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ygm-tdws-wfgq
12
url VCID-a2cs-tncg-s3b8
vulnerability_id VCID-a2cs-tncg-s3b8
summary kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10877.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10877
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47263
published_at 2026-04-01T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47268
published_at 2026-04-29T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47382
published_at 2026-04-16T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47375
published_at 2026-04-18T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47326
published_at 2026-04-21T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47311
published_at 2026-04-24T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.473
published_at 2026-04-02T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.4732
published_at 2026-04-26T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.47267
published_at 2026-04-07T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47322
published_at 2026-04-08T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.47318
published_at 2026-04-09T12:55:00Z
11
value 0.0024
scoring_system epss
scoring_elements 0.47343
published_at 2026-04-11T12:55:00Z
12
value 0.0024
scoring_system epss
scoring_elements 0.47317
published_at 2026-04-12T12:55:00Z
13
value 0.0024
scoring_system epss
scoring_elements 0.47324
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10877
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10877
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
6
reference_url http://www.securityfocus.com/bid/104878
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104878
7
reference_url http://www.securityfocus.com/bid/106503
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106503
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596795
reference_id 1596795
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596795
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10877
reference_id CVE-2018-10877
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
2
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10877
17
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
18
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
19
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
20
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
21
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
22
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
23
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
24
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10877
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2cs-tncg-s3b8
13
url VCID-b77n-fg17-zybj
vulnerability_id VCID-b77n-fg17-zybj
summary kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10878.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10878
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16858
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16915
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.167
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16785
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1684
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16819
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16775
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16717
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16652
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.1666
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16698
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16601
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.1659
published_at 2026-04-26T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16555
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596802
reference_id 1596802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596802
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
9
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
10
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
11
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
12
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
13
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10878
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b77n-fg17-zybj
14
url VCID-bq4k-frp2-jkda
vulnerability_id VCID-bq4k-frp2-jkda
summary kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1118.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1118
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29067
published_at 2026-04-01T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.28675
published_at 2026-04-29T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29024
published_at 2026-04-18T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.28978
published_at 2026-04-21T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.28858
published_at 2026-04-24T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.28745
published_at 2026-04-26T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29142
published_at 2026-04-02T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29191
published_at 2026-04-04T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29001
published_at 2026-04-07T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29065
published_at 2026-04-08T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29107
published_at 2026-04-09T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29113
published_at 2026-04-11T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29069
published_at 2026-04-12T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.29018
published_at 2026-04-13T12:55:00Z
14
value 0.00108
scoring_system epss
scoring_elements 0.29047
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1118
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1573699
reference_id 1573699
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1573699
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1118
reference_id CVE-2018-1118
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-1118
16
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
17
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
18
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
19
reference_url https://usn.ubuntu.com/3762-1/
reference_id USN-3762-1
reference_type
scores
url https://usn.ubuntu.com/3762-1/
20
reference_url https://usn.ubuntu.com/3762-2/
reference_id USN-3762-2
reference_type
scores
url https://usn.ubuntu.com/3762-2/
fixed_packages
aliases CVE-2018-1118
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bq4k-frp2-jkda
15
url VCID-bquu-fuhh-7qha
vulnerability_id VCID-bquu-fuhh-7qha
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5803
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18702
published_at 2026-04-29T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18876
published_at 2026-04-21T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18765
published_at 2026-04-24T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18746
published_at 2026-04-26T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-02T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-04T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25175
published_at 2026-04-07T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25244
published_at 2026-04-08T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25303
published_at 2026-04-11T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25261
published_at 2026-04-12T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25208
published_at 2026-04-13T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25217
published_at 2026-04-16T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.25207
published_at 2026-04-18T12:55:00Z
13
value 0.00089
scoring_system epss
scoring_elements 0.25289
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5803
2
reference_url https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
3
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
7
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
52
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
53
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
54
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
55
reference_url https://secuniaresearch.flexerasoftware.com/advisories/81331/
reference_id
reference_type
scores
url https://secuniaresearch.flexerasoftware.com/advisories/81331/
56
reference_url https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
reference_id
reference_type
scores
url https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
57
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
58
reference_url https://www.debian.org/security/2018/dsa-4188
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4188
59
reference_url https://www.spinics.net/lists/linux-sctp/msg07036.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/linux-sctp/msg07036.html
60
reference_url https://www.spinics.net/lists/netdev/msg482523.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/netdev/msg482523.html
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551051
reference_id 1551051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551051
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5803
reference_id CVE-2018-5803
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5803
71
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
72
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
73
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
74
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
75
reference_url https://access.redhat.com/errata/RHSA-2019:0641
reference_id RHSA-2019:0641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0641
76
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
77
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
78
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
79
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
80
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
81
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
82
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-5803
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bquu-fuhh-7qha
16
url VCID-c18m-kjfu-kkb5
vulnerability_id VCID-c18m-kjfu-kkb5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1068.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1068.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1068
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08924
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08928
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08978
published_at 2026-04-26T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08908
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08986
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.09018
published_at 2026-04-09T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.09017
published_at 2026-04-11T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.0898
published_at 2026-04-12T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08968
published_at 2026-04-13T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08859
published_at 2026-04-16T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08834
published_at 2026-04-18T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08983
published_at 2026-04-21T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.0903
published_at 2026-04-24T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.0896
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552048
reference_id 1552048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552048
48
reference_url https://access.redhat.com/errata/RHSA-2018:1318
reference_id RHSA-2018:1318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1318
49
reference_url https://access.redhat.com/errata/RHSA-2018:1355
reference_id RHSA-2018:1355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1355
50
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
51
reference_url https://access.redhat.com/errata/RHSA-2019:1170
reference_id RHSA-2019:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1170
52
reference_url https://access.redhat.com/errata/RHSA-2019:1190
reference_id RHSA-2019:1190
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1190
53
reference_url https://access.redhat.com/errata/RHSA-2019:4159
reference_id RHSA-2019:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4159
54
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
55
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
56
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
57
reference_url https://usn.ubuntu.com/3674-1/
reference_id USN-3674-1
reference_type
scores
url https://usn.ubuntu.com/3674-1/
58
reference_url https://usn.ubuntu.com/3674-2/
reference_id USN-3674-2
reference_type
scores
url https://usn.ubuntu.com/3674-2/
59
reference_url https://usn.ubuntu.com/3677-1/
reference_id USN-3677-1
reference_type
scores
url https://usn.ubuntu.com/3677-1/
60
reference_url https://usn.ubuntu.com/3677-2/
reference_id USN-3677-2
reference_type
scores
url https://usn.ubuntu.com/3677-2/
fixed_packages
aliases CVE-2018-1068
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c18m-kjfu-kkb5
17
url VCID-cec5-67y6-2ybs
vulnerability_id VCID-cec5-67y6-2ybs
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7757.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7757
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2789
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27946
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27986
published_at 2026-04-04T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27778
published_at 2026-04-07T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27845
published_at 2026-04-08T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27887
published_at 2026-04-09T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27892
published_at 2026-04-11T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2785
published_at 2026-04-12T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.27634
published_at 2026-04-29T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.27962
published_at 2026-04-13T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.27971
published_at 2026-04-16T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.27954
published_at 2026-04-18T12:55:00Z
12
value 0.00102
scoring_system epss
scoring_elements 0.27905
published_at 2026-04-21T12:55:00Z
13
value 0.00102
scoring_system epss
scoring_elements 0.2782
published_at 2026-04-24T12:55:00Z
14
value 0.00102
scoring_system epss
scoring_elements 0.27708
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553361
reference_id 1553361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553361
48
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
49
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
50
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
51
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
52
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
53
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
54
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
55
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
56
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
57
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-7757
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cec5-67y6-2ybs
18
url VCID-dpen-awyv-w7gu
vulnerability_id VCID-dpen-awyv-w7gu
summary kernel: Mishandled freeing of instances in pcrypt.c can allow a local user to cause a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18075.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18075.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18075
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19702
published_at 2026-04-29T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-13T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19842
published_at 2026-04-16T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19847
published_at 2026-04-18T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19845
published_at 2026-04-21T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.1974
published_at 2026-04-24T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19732
published_at 2026-04-26T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19949
published_at 2026-04-09T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19968
published_at 2026-04-11T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19924
published_at 2026-04-12T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.2111
published_at 2026-04-02T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21164
published_at 2026-04-04T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20878
published_at 2026-04-07T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20959
published_at 2026-04-08T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.20958
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18075
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18075
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539508
reference_id 1539508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539508
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
7
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
fixed_packages
aliases CVE-2017-18075
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dpen-awyv-w7gu
19
url VCID-emks-s3rq-sqce
vulnerability_id VCID-emks-s3rq-sqce
summary kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000026.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000026
reference_id
reference_type
scores
0
value 0.00865
scoring_system epss
scoring_elements 0.75068
published_at 2026-04-01T12:55:00Z
1
value 0.00865
scoring_system epss
scoring_elements 0.75071
published_at 2026-04-02T12:55:00Z
2
value 0.00865
scoring_system epss
scoring_elements 0.751
published_at 2026-04-04T12:55:00Z
3
value 0.00865
scoring_system epss
scoring_elements 0.75077
published_at 2026-04-07T12:55:00Z
4
value 0.00865
scoring_system epss
scoring_elements 0.75111
published_at 2026-04-08T12:55:00Z
5
value 0.00865
scoring_system epss
scoring_elements 0.75122
published_at 2026-04-09T12:55:00Z
6
value 0.00865
scoring_system epss
scoring_elements 0.75144
published_at 2026-04-11T12:55:00Z
7
value 0.00865
scoring_system epss
scoring_elements 0.75123
published_at 2026-04-12T12:55:00Z
8
value 0.00865
scoring_system epss
scoring_elements 0.75112
published_at 2026-04-13T12:55:00Z
9
value 0.00865
scoring_system epss
scoring_elements 0.75149
published_at 2026-04-16T12:55:00Z
10
value 0.00865
scoring_system epss
scoring_elements 0.75156
published_at 2026-04-18T12:55:00Z
11
value 0.00865
scoring_system epss
scoring_elements 0.75146
published_at 2026-04-21T12:55:00Z
12
value 0.00865
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-24T12:55:00Z
13
value 0.00865
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-26T12:55:00Z
14
value 0.00865
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1541846
reference_id 1541846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1541846
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
9
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
10
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
11
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
12
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
13
reference_url https://usn.ubuntu.com/3620-1/
reference_id USN-3620-1
reference_type
scores
url https://usn.ubuntu.com/3620-1/
14
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
url https://usn.ubuntu.com/3620-2/
15
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2018-1000026
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-emks-s3rq-sqce
20
url VCID-ey8y-sqax-hkak
vulnerability_id VCID-ey8y-sqax-hkak
summary kernel: out-of-bound access in fs/posix_acl.c:get_acl() causes crash with crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1095.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1095
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35867
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36058
published_at 2026-04-02T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36088
published_at 2026-04-04T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-07T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.35971
published_at 2026-04-08T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.35994
published_at 2026-04-09T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36001
published_at 2026-04-11T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.35962
published_at 2026-04-12T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.35938
published_at 2026-04-13T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.35978
published_at 2026-04-16T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.35964
published_at 2026-04-18T12:55:00Z
11
value 0.00153
scoring_system epss
scoring_elements 0.35913
published_at 2026-04-21T12:55:00Z
12
value 0.00153
scoring_system epss
scoring_elements 0.35684
published_at 2026-04-24T12:55:00Z
13
value 0.00153
scoring_system epss
scoring_elements 0.35652
published_at 2026-04-26T12:55:00Z
14
value 0.00153
scoring_system epss
scoring_elements 0.35564
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560793
reference_id 1560793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560793
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://usn.ubuntu.com/3695-1/
reference_id USN-3695-1
reference_type
scores
url https://usn.ubuntu.com/3695-1/
7
reference_url https://usn.ubuntu.com/3695-2/
reference_id USN-3695-2
reference_type
scores
url https://usn.ubuntu.com/3695-2/
fixed_packages
aliases CVE-2018-1095
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey8y-sqax-hkak
21
url VCID-fva3-4ry2-c7em
vulnerability_id VCID-fva3-4ry2-c7em
summary kernel: NULL pointer dereference on OOM kill of large mlocked process
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000200.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000200.json
1
reference_url https://access.redhat.com/security/cve/cve-2018-1000200
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2018-1000200
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000200
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24433
published_at 2026-04-01T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24199
published_at 2026-04-29T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24253
published_at 2026-04-24T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24239
published_at 2026-04-26T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24558
published_at 2026-04-02T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24596
published_at 2026-04-04T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24373
published_at 2026-04-07T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24442
published_at 2026-04-08T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24486
published_at 2026-04-09T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24501
published_at 2026-04-11T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24457
published_at 2026-04-12T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.244
published_at 2026-04-13T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24416
published_at 2026-04-16T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24407
published_at 2026-04-18T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24379
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000200
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000200
4
reference_url http://seclists.org/oss-sec/2018/q2/67
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2018/q2/67
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
6
reference_url https://marc.info/?l=linux-kernel&m=152400522806945
reference_id
reference_type
scores
url https://marc.info/?l=linux-kernel&m=152400522806945
7
reference_url https://marc.info/?l=linux-kernel&m=152460926619256
reference_id
reference_type
scores
url https://marc.info/?l=linux-kernel&m=152460926619256
8
reference_url http://www.securityfocus.com/bid/104397
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104397
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568744
reference_id 1568744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568744
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.14:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000200
reference_id CVE-2018-1000200
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000200
14
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
15
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
16
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
17
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
fixed_packages
aliases CVE-2018-1000200
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fva3-4ry2-c7em
22
url VCID-j26e-qn4j-euej
vulnerability_id VCID-j26e-qn4j-euej
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1092.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1092
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46805
published_at 2026-04-01T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46843
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46861
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.4681
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46864
published_at 2026-04-09T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46887
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46867
published_at 2026-04-13T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46922
published_at 2026-04-16T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46919
published_at 2026-04-18T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46868
published_at 2026-04-21T12:55:00Z
11
value 0.00238
scoring_system epss
scoring_elements 0.46852
published_at 2026-04-24T12:55:00Z
12
value 0.00238
scoring_system epss
scoring_elements 0.46862
published_at 2026-04-26T12:55:00Z
13
value 0.00238
scoring_system epss
scoring_elements 0.46812
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1092
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560777
reference_id 1560777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560777
48
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
49
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
50
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
51
reference_url https://usn.ubuntu.com/3676-1/
reference_id USN-3676-1
reference_type
scores
url https://usn.ubuntu.com/3676-1/
52
reference_url https://usn.ubuntu.com/3676-2/
reference_id USN-3676-2
reference_type
scores
url https://usn.ubuntu.com/3676-2/
53
reference_url https://usn.ubuntu.com/3677-1/
reference_id USN-3677-1
reference_type
scores
url https://usn.ubuntu.com/3677-1/
54
reference_url https://usn.ubuntu.com/3677-2/
reference_id USN-3677-2
reference_type
scores
url https://usn.ubuntu.com/3677-2/
55
reference_url https://usn.ubuntu.com/3678-1/
reference_id USN-3678-1
reference_type
scores
url https://usn.ubuntu.com/3678-1/
56
reference_url https://usn.ubuntu.com/3678-2/
reference_id USN-3678-2
reference_type
scores
url https://usn.ubuntu.com/3678-2/
57
reference_url https://usn.ubuntu.com/3678-3/
reference_id USN-3678-3
reference_type
scores
url https://usn.ubuntu.com/3678-3/
58
reference_url https://usn.ubuntu.com/3678-4/
reference_id USN-3678-4
reference_type
scores
url https://usn.ubuntu.com/3678-4/
59
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-1092
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j26e-qn4j-euej
23
url VCID-k58u-73w7-y3gn
vulnerability_id VCID-k58u-73w7-y3gn
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7566.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7566
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15991
published_at 2026-04-18T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16173
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16233
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16027
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16113
published_at 2026-04-12T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16175
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16152
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16045
published_at 2026-04-13T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15979
published_at 2026-04-16T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16039
published_at 2026-04-21T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15933
published_at 2026-04-24T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15928
published_at 2026-04-26T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15893
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1550142
reference_id 1550142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1550142
48
reference_url https://access.redhat.com/errata/RHSA-2018:2384
reference_id RHSA-2018:2384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2384
49
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
50
reference_url https://access.redhat.com/errata/RHSA-2018:2395
reference_id RHSA-2018:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2395
51
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
52
reference_url https://access.redhat.com/errata/RHSA-2019:1483
reference_id RHSA-2019:1483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1483
53
reference_url https://access.redhat.com/errata/RHSA-2019:1487
reference_id RHSA-2019:1487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1487
54
reference_url https://usn.ubuntu.com/3631-1/
reference_id USN-3631-1
reference_type
scores
url https://usn.ubuntu.com/3631-1/
55
reference_url https://usn.ubuntu.com/3631-2/
reference_id USN-3631-2
reference_type
scores
url https://usn.ubuntu.com/3631-2/
56
reference_url https://usn.ubuntu.com/3798-1/
reference_id USN-3798-1
reference_type
scores
url https://usn.ubuntu.com/3798-1/
57
reference_url https://usn.ubuntu.com/3798-2/
reference_id USN-3798-2
reference_type
scores
url https://usn.ubuntu.com/3798-2/
fixed_packages
aliases CVE-2018-7566
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k58u-73w7-y3gn
24
url VCID-kn7p-3uxm-dyeh
vulnerability_id VCID-kn7p-3uxm-dyeh
summary kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18344.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18344
reference_id
reference_type
scores
0
value 0.119
scoring_system epss
scoring_elements 0.93702
published_at 2026-04-01T12:55:00Z
1
value 0.119
scoring_system epss
scoring_elements 0.93712
published_at 2026-04-02T12:55:00Z
2
value 0.119
scoring_system epss
scoring_elements 0.93722
published_at 2026-04-04T12:55:00Z
3
value 0.119
scoring_system epss
scoring_elements 0.93725
published_at 2026-04-07T12:55:00Z
4
value 0.119
scoring_system epss
scoring_elements 0.93734
published_at 2026-04-08T12:55:00Z
5
value 0.119
scoring_system epss
scoring_elements 0.93736
published_at 2026-04-09T12:55:00Z
6
value 0.119
scoring_system epss
scoring_elements 0.9374
published_at 2026-04-13T12:55:00Z
7
value 0.119
scoring_system epss
scoring_elements 0.93762
published_at 2026-04-16T12:55:00Z
8
value 0.12859
scoring_system epss
scoring_elements 0.94066
published_at 2026-04-26T12:55:00Z
9
value 0.12859
scoring_system epss
scoring_elements 0.94065
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610958
reference_id 1610958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610958
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://access.redhat.com/errata/RHSA-2018:3459
reference_id RHSA-2018:3459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3459
9
reference_url https://access.redhat.com/errata/RHSA-2018:3540
reference_id RHSA-2018:3540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3540
10
reference_url https://access.redhat.com/errata/RHSA-2018:3586
reference_id RHSA-2018:3586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3586
11
reference_url https://access.redhat.com/errata/RHSA-2018:3590
reference_id RHSA-2018:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3590
12
reference_url https://access.redhat.com/errata/RHSA-2018:3591
reference_id RHSA-2018:3591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3591
13
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
14
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
fixed_packages
aliases CVE-2017-18344
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kn7p-3uxm-dyeh
25
url VCID-kwt2-vy63-w7cn
vulnerability_id VCID-kwt2-vy63-w7cn
summary kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10879.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10879
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09578
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09644
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09552
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09626
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09674
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09687
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09654
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09638
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09529
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09534
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09684
published_at 2026-04-21T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09733
published_at 2026-04-24T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09698
published_at 2026-04-26T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09659
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596806
reference_id 1596806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596806
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
9
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
10
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
11
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
12
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
13
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10879
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwt2-vy63-w7cn
26
url VCID-ncv3-w528-hydu
vulnerability_id VCID-ncv3-w528-hydu
summary kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5848.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5848
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-01T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-29T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35864
published_at 2026-04-21T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35636
published_at 2026-04-24T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35605
published_at 2026-04-26T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.36009
published_at 2026-04-02T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.36039
published_at 2026-04-04T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.3587
published_at 2026-04-07T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.3592
published_at 2026-04-08T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35944
published_at 2026-04-09T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.3595
published_at 2026-04-11T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35911
published_at 2026-04-12T12:55:00Z
12
value 0.00152
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-13T12:55:00Z
13
value 0.00152
scoring_system epss
scoring_elements 0.35926
published_at 2026-04-16T12:55:00Z
14
value 0.00152
scoring_system epss
scoring_elements 0.35914
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
5
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
7
reference_url https://source.android.com/security/bulletin/pixel/2018-05-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2018-05-01
8
reference_url https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2
reference_id
reference_type
scores
url https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590799
reference_id 1590799
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590799
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5848
reference_id CVE-2018-5848
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5848
17
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
18
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
19
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
fixed_packages
aliases CVE-2018-5848
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncv3-w528-hydu
27
url VCID-pbkm-v7ye-5uf2
vulnerability_id VCID-pbkm-v7ye-5uf2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8781.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8781
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27921
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27518
published_at 2026-04-29T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.2776
published_at 2026-04-21T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27703
published_at 2026-04-24T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27593
published_at 2026-04-26T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27977
published_at 2026-04-02T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28018
published_at 2026-04-04T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2781
published_at 2026-04-07T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27877
published_at 2026-04-12T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27918
published_at 2026-04-09T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27919
published_at 2026-04-11T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27818
published_at 2026-04-13T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27826
published_at 2026-04-16T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.27803
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
48
reference_url https://patchwork.freedesktop.org/patch/211845/
reference_id
reference_type
scores
url https://patchwork.freedesktop.org/patch/211845/
49
reference_url https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
reference_id
reference_type
scores
url https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
50
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
51
reference_url https://www.debian.org/security/2018/dsa-4188
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4188
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1571062
reference_id 1571062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1571062
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8781
reference_id CVE-2018-8781
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-8781
65
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
66
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
67
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
68
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
69
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
70
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
71
reference_url https://usn.ubuntu.com/3674-1/
reference_id USN-3674-1
reference_type
scores
url https://usn.ubuntu.com/3674-1/
72
reference_url https://usn.ubuntu.com/3674-2/
reference_id USN-3674-2
reference_type
scores
url https://usn.ubuntu.com/3674-2/
73
reference_url https://usn.ubuntu.com/3677-1/
reference_id USN-3677-1
reference_type
scores
url https://usn.ubuntu.com/3677-1/
74
reference_url https://usn.ubuntu.com/3677-2/
reference_id USN-3677-2
reference_type
scores
url https://usn.ubuntu.com/3677-2/
fixed_packages
aliases CVE-2018-8781
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbkm-v7ye-5uf2
28
url VCID-pyrh-z2cb-1bfk
vulnerability_id VCID-pyrh-z2cb-1bfk
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1065.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1065
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24479
published_at 2026-04-01T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24597
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24633
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24408
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24477
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24521
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24536
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24435
published_at 2026-04-13T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24451
published_at 2026-04-16T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24445
published_at 2026-04-18T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24421
published_at 2026-04-21T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24305
published_at 2026-04-24T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24291
published_at 2026-04-26T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24251
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1065
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
28
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1547824
reference_id 1547824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1547824
30
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
31
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
32
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
33
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
fixed_packages
aliases CVE-2018-1065
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyrh-z2cb-1bfk
29
url VCID-q4ce-wgv2-ryhu
vulnerability_id VCID-q4ce-wgv2-ryhu
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5391.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5391.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5391
reference_id
reference_type
scores
0
value 0.03822
scoring_system epss
scoring_elements 0.88077
published_at 2026-04-01T12:55:00Z
1
value 0.03822
scoring_system epss
scoring_elements 0.88126
published_at 2026-04-08T12:55:00Z
2
value 0.03822
scoring_system epss
scoring_elements 0.88085
published_at 2026-04-02T12:55:00Z
3
value 0.03822
scoring_system epss
scoring_elements 0.88101
published_at 2026-04-04T12:55:00Z
4
value 0.03822
scoring_system epss
scoring_elements 0.88107
published_at 2026-04-07T12:55:00Z
5
value 0.03822
scoring_system epss
scoring_elements 0.88132
published_at 2026-04-09T12:55:00Z
6
value 0.03822
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-11T12:55:00Z
7
value 0.03826
scoring_system epss
scoring_elements 0.88155
published_at 2026-04-16T12:55:00Z
8
value 0.03826
scoring_system epss
scoring_elements 0.8817
published_at 2026-04-24T12:55:00Z
9
value 0.03826
scoring_system epss
scoring_elements 0.88175
published_at 2026-04-26T12:55:00Z
10
value 0.03826
scoring_system epss
scoring_elements 0.88174
published_at 2026-04-29T12:55:00Z
11
value 0.03826
scoring_system epss
scoring_elements 0.8814
published_at 2026-04-12T12:55:00Z
12
value 0.03826
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-13T12:55:00Z
13
value 0.03826
scoring_system epss
scoring_elements 0.88152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5391
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609664
reference_id 1609664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609664
5
reference_url https://security.archlinux.org/AVG-760
reference_id AVG-760
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-760
6
reference_url https://security.archlinux.org/AVG-761
reference_id AVG-761
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-761
7
reference_url https://security.archlinux.org/AVG-762
reference_id AVG-762
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-762
8
reference_url https://security.archlinux.org/AVG-767
reference_id AVG-767
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-767
9
reference_url https://access.redhat.com/errata/RHSA-2018:2785
reference_id RHSA-2018:2785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2785
10
reference_url https://access.redhat.com/errata/RHSA-2018:2791
reference_id RHSA-2018:2791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2791
11
reference_url https://access.redhat.com/errata/RHSA-2018:2846
reference_id RHSA-2018:2846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2846
12
reference_url https://access.redhat.com/errata/RHSA-2018:2924
reference_id RHSA-2018:2924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2924
13
reference_url https://access.redhat.com/errata/RHSA-2018:2925
reference_id RHSA-2018:2925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2925
14
reference_url https://access.redhat.com/errata/RHSA-2018:2933
reference_id RHSA-2018:2933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2933
15
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
16
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
17
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
18
reference_url https://access.redhat.com/errata/RHSA-2018:3459
reference_id RHSA-2018:3459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3459
19
reference_url https://access.redhat.com/errata/RHSA-2018:3540
reference_id RHSA-2018:3540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3540
20
reference_url https://access.redhat.com/errata/RHSA-2018:3586
reference_id RHSA-2018:3586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3586
21
reference_url https://access.redhat.com/errata/RHSA-2018:3590
reference_id RHSA-2018:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3590
22
reference_url https://usn.ubuntu.com/3740-1/
reference_id USN-3740-1
reference_type
scores
url https://usn.ubuntu.com/3740-1/
23
reference_url https://usn.ubuntu.com/3740-2/
reference_id USN-3740-2
reference_type
scores
url https://usn.ubuntu.com/3740-2/
24
reference_url https://usn.ubuntu.com/3741-1/
reference_id USN-3741-1
reference_type
scores
url https://usn.ubuntu.com/3741-1/
25
reference_url https://usn.ubuntu.com/3741-2/
reference_id USN-3741-2
reference_type
scores
url https://usn.ubuntu.com/3741-2/
26
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
27
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
fixed_packages
aliases CVE-2018-5391
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4ce-wgv2-ryhu
30
url VCID-qd2m-y4xv-nqga
vulnerability_id VCID-qd2m-y4xv-nqga
summary kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1094.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1094
reference_id
reference_type
scores
0
value 0.00285
scoring_system epss
scoring_elements 0.51798
published_at 2026-04-01T12:55:00Z
1
value 0.00285
scoring_system epss
scoring_elements 0.51847
published_at 2026-04-02T12:55:00Z
2
value 0.00285
scoring_system epss
scoring_elements 0.51873
published_at 2026-04-04T12:55:00Z
3
value 0.00285
scoring_system epss
scoring_elements 0.51837
published_at 2026-04-07T12:55:00Z
4
value 0.00285
scoring_system epss
scoring_elements 0.51892
published_at 2026-04-08T12:55:00Z
5
value 0.00285
scoring_system epss
scoring_elements 0.5189
published_at 2026-04-26T12:55:00Z
6
value 0.00285
scoring_system epss
scoring_elements 0.51943
published_at 2026-04-11T12:55:00Z
7
value 0.00285
scoring_system epss
scoring_elements 0.51925
published_at 2026-04-12T12:55:00Z
8
value 0.00285
scoring_system epss
scoring_elements 0.51909
published_at 2026-04-13T12:55:00Z
9
value 0.00285
scoring_system epss
scoring_elements 0.51952
published_at 2026-04-16T12:55:00Z
10
value 0.00285
scoring_system epss
scoring_elements 0.51958
published_at 2026-04-18T12:55:00Z
11
value 0.00285
scoring_system epss
scoring_elements 0.51938
published_at 2026-04-21T12:55:00Z
12
value 0.00285
scoring_system epss
scoring_elements 0.51885
published_at 2026-04-24T12:55:00Z
13
value 0.00285
scoring_system epss
scoring_elements 0.5185
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560788
reference_id 1560788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560788
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3695-1/
reference_id USN-3695-1
reference_type
scores
url https://usn.ubuntu.com/3695-1/
9
reference_url https://usn.ubuntu.com/3695-2/
reference_id USN-3695-2
reference_type
scores
url https://usn.ubuntu.com/3695-2/
fixed_packages
aliases CVE-2018-1094
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qd2m-y4xv-nqga
31
url VCID-sqgb-831s-cqhn
vulnerability_id VCID-sqgb-831s-cqhn
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9363.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-9363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-9363
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-01T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10129
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-08T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.147
published_at 2026-04-09T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1466
published_at 2026-04-11T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14622
published_at 2026-04-12T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14566
published_at 2026-04-13T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14458
published_at 2026-04-16T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14462
published_at 2026-04-18T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1453
published_at 2026-04-21T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.1456
published_at 2026-04-24T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14558
published_at 2026-04-26T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.145
published_at 2026-04-29T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14743
published_at 2026-04-04T12:55:00Z
14
value 0.00047
scoring_system epss
scoring_elements 0.14551
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-9363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13099
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1623067
reference_id 1623067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1623067
22
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
23
reference_url https://access.redhat.com/errata/RHSA-2019:2029
reference_id RHSA-2019:2029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2029
24
reference_url https://access.redhat.com/errata/RHSA-2019:2043
reference_id RHSA-2019:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2043
25
reference_url https://usn.ubuntu.com/3797-1/
reference_id USN-3797-1
reference_type
scores
url https://usn.ubuntu.com/3797-1/
26
reference_url https://usn.ubuntu.com/3797-2/
reference_id USN-3797-2
reference_type
scores
url https://usn.ubuntu.com/3797-2/
27
reference_url https://usn.ubuntu.com/3820-1/
reference_id USN-3820-1
reference_type
scores
url https://usn.ubuntu.com/3820-1/
28
reference_url https://usn.ubuntu.com/3820-2/
reference_id USN-3820-2
reference_type
scores
url https://usn.ubuntu.com/3820-2/
29
reference_url https://usn.ubuntu.com/3820-3/
reference_id USN-3820-3
reference_type
scores
url https://usn.ubuntu.com/3820-3/
30
reference_url https://usn.ubuntu.com/3822-1/
reference_id USN-3822-1
reference_type
scores
url https://usn.ubuntu.com/3822-1/
31
reference_url https://usn.ubuntu.com/3822-2/
reference_id USN-3822-2
reference_type
scores
url https://usn.ubuntu.com/3822-2/
fixed_packages
aliases CVE-2018-9363
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sqgb-831s-cqhn
32
url VCID-t9qg-h55b-4yff
vulnerability_id VCID-t9qg-h55b-4yff
summary kernel: NULL pointer dereference if close and fchownat system calls share a socket file descriptor
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea68cc6209c866fd3e14
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea68cc6209c866fd3e14
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12232.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12232.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12232
reference_id
reference_type
scores
0
value 0.03298
scoring_system epss
scoring_elements 0.87172
published_at 2026-04-01T12:55:00Z
1
value 0.03298
scoring_system epss
scoring_elements 0.87267
published_at 2026-04-29T12:55:00Z
2
value 0.03298
scoring_system epss
scoring_elements 0.87239
published_at 2026-04-21T12:55:00Z
3
value 0.03298
scoring_system epss
scoring_elements 0.87257
published_at 2026-04-24T12:55:00Z
4
value 0.03298
scoring_system epss
scoring_elements 0.87263
published_at 2026-04-26T12:55:00Z
5
value 0.03298
scoring_system epss
scoring_elements 0.87182
published_at 2026-04-02T12:55:00Z
6
value 0.03298
scoring_system epss
scoring_elements 0.87199
published_at 2026-04-04T12:55:00Z
7
value 0.03298
scoring_system epss
scoring_elements 0.87196
published_at 2026-04-07T12:55:00Z
8
value 0.03298
scoring_system epss
scoring_elements 0.87216
published_at 2026-04-08T12:55:00Z
9
value 0.03298
scoring_system epss
scoring_elements 0.87223
published_at 2026-04-09T12:55:00Z
10
value 0.03298
scoring_system epss
scoring_elements 0.87236
published_at 2026-04-11T12:55:00Z
11
value 0.03298
scoring_system epss
scoring_elements 0.8723
published_at 2026-04-12T12:55:00Z
12
value 0.03298
scoring_system epss
scoring_elements 0.87226
published_at 2026-04-13T12:55:00Z
13
value 0.03298
scoring_system epss
scoring_elements 0.87241
published_at 2026-04-16T12:55:00Z
14
value 0.03298
scoring_system epss
scoring_elements 0.87245
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12232
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12232
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
6
reference_url https://lkml.org/lkml/2018/6/5/14
reference_id
reference_type
scores
url https://lkml.org/lkml/2018/6/5/14
7
reference_url https://patchwork.ozlabs.org/patch/926519/
reference_id
reference_type
scores
url https://patchwork.ozlabs.org/patch/926519/
8
reference_url http://www.securityfocus.com/bid/104453
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104453
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590215
reference_id 1590215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590215
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12232
reference_id CVE-2018-12232
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12232
12
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
13
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
14
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
15
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
fixed_packages
aliases CVE-2018-12232
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9qg-h55b-4yff
33
url VCID-tbwt-eez2-6ufm
vulnerability_id VCID-tbwt-eez2-6ufm
summary kernel: Use-after-free in drivers/media/dvb-core/dvb_frontend.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16648.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16648
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16796
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16648
published_at 2026-04-29T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16878
published_at 2026-04-12T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16819
published_at 2026-04-13T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16753
published_at 2026-04-16T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16759
published_at 2026-04-18T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16793
published_at 2026-04-21T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16698
published_at 2026-04-24T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16683
published_at 2026-04-26T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16965
published_at 2026-04-02T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.1702
published_at 2026-04-04T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16803
published_at 2026-04-07T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.16892
published_at 2026-04-08T12:55:00Z
13
value 0.00054
scoring_system epss
scoring_elements 0.1695
published_at 2026-04-09T12:55:00Z
14
value 0.00054
scoring_system epss
scoring_elements 0.16924
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16648
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://groups.google.com/d/msg/syzkaller/0HJQqTm0G_g/T931ItskBAAJ
reference_id
reference_type
scores
url https://groups.google.com/d/msg/syzkaller/0HJQqTm0G_g/T931ItskBAAJ
4
reference_url https://patchwork.kernel.org/patch/10046189/
reference_id
reference_type
scores
url https://patchwork.kernel.org/patch/10046189/
5
reference_url http://www.securityfocus.com/bid/101758
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101758
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1516257
reference_id 1516257
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1516257
7
reference_url https://security.archlinux.org/AVG-484
reference_id AVG-484
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-484
8
reference_url https://security.archlinux.org/AVG-568
reference_id AVG-568
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-568
9
reference_url https://security.archlinux.org/AVG-569
reference_id AVG-569
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-569
10
reference_url https://security.archlinux.org/AVG-570
reference_id AVG-570
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-570
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16648
reference_id CVE-2017-16648
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16648
13
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
fixed_packages
aliases CVE-2017-16648
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbwt-eez2-6ufm
34
url VCID-tn1d-x7wx-5bdb
vulnerability_id VCID-tn1d-x7wx-5bdb
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13166.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-13166
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24628
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.2442
published_at 2026-04-29T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24532
published_at 2026-04-21T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24476
published_at 2026-04-24T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24461
published_at 2026-04-26T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24704
published_at 2026-04-02T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24743
published_at 2026-04-04T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24516
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24587
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24634
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.2465
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24607
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24553
published_at 2026-04-13T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24565
published_at 2026-04-16T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-13166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
38
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
39
reference_url https://source.android.com/security/bulletin/pixel/2017-12-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2017-12-01
40
reference_url https://www.debian.org/security/2018/dsa-4120
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4120
41
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1548412
reference_id 1548412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1548412
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-13166
reference_id CVE-2017-13166
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-13166
45
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
46
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
47
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
48
reference_url https://access.redhat.com/errata/RHSA-2018:1170
reference_id RHSA-2018:1170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1170
49
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
50
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
fixed_packages
aliases CVE-2017-13166
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-x7wx-5bdb
35
url VCID-ua2b-vqqr-f3gb
vulnerability_id VCID-ua2b-vqqr-f3gb
summary kernel: Infoleak caused by incorrect handling of the SG_IO ioctl
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000204.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000204.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000204
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.26935
published_at 2026-04-26T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-09T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31363
published_at 2026-04-01T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31405
published_at 2026-04-12T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31369
published_at 2026-04-13T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31402
published_at 2026-04-16T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31382
published_at 2026-04-18T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31354
published_at 2026-04-21T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31501
published_at 2026-04-02T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31542
published_at 2026-04-04T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31361
published_at 2026-04-07T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31414
published_at 2026-04-08T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31448
published_at 2026-04-11T12:55:00Z
13
value 0.00132
scoring_system epss
scoring_elements 0.32603
published_at 2026-04-24T12:55:00Z
14
value 0.00136
scoring_system epss
scoring_elements 0.33069
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824
6
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
9
reference_url http://www.openwall.com/lists/oss-security/2018/06/26/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2018/06/26/3
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1589324
reference_id 1589324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1589324
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000204
reference_id CVE-2018-1000204
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:C/I:N/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000204
17
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
18
reference_url https://usn.ubuntu.com/3696-1/
reference_id USN-3696-1
reference_type
scores
url https://usn.ubuntu.com/3696-1/
19
reference_url https://usn.ubuntu.com/3696-2/
reference_id USN-3696-2
reference_type
scores
url https://usn.ubuntu.com/3696-2/
20
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
21
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
22
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
23
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-1000204
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua2b-vqqr-f3gb
36
url VCID-uhaa-kaea-zuf4
vulnerability_id VCID-uhaa-kaea-zuf4
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5750.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5750
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11131
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11195
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11017
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11097
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11151
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11155
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11122
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.111
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10965
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10979
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11116
published_at 2026-04-21T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.11061
published_at 2026-04-24T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.11015
published_at 2026-04-26T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10949
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539706
reference_id 1539706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539706
38
reference_url https://access.redhat.com/errata/RHSA-2018:0676
reference_id RHSA-2018:0676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0676
39
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
40
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
41
reference_url https://usn.ubuntu.com/3631-1/
reference_id USN-3631-1
reference_type
scores
url https://usn.ubuntu.com/3631-1/
42
reference_url https://usn.ubuntu.com/3631-2/
reference_id USN-3631-2
reference_type
scores
url https://usn.ubuntu.com/3631-2/
43
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
44
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
45
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
46
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-5750
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uhaa-kaea-zuf4
37
url VCID-vjfv-v9np-vkek
vulnerability_id VCID-vjfv-v9np-vkek
summary
Multiple vulnerabilities have been found in procps, the worst of
    which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1120.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1120.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1120
reference_id
reference_type
scores
0
value 0.01335
scoring_system epss
scoring_elements 0.79931
published_at 2026-04-01T12:55:00Z
1
value 0.01335
scoring_system epss
scoring_elements 0.79947
published_at 2026-04-07T12:55:00Z
2
value 0.01335
scoring_system epss
scoring_elements 0.79938
published_at 2026-04-02T12:55:00Z
3
value 0.01335
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-04T12:55:00Z
4
value 0.01335
scoring_system epss
scoring_elements 0.79976
published_at 2026-04-08T12:55:00Z
5
value 0.01335
scoring_system epss
scoring_elements 0.79985
published_at 2026-04-09T12:55:00Z
6
value 0.01335
scoring_system epss
scoring_elements 0.80005
published_at 2026-04-11T12:55:00Z
7
value 0.01335
scoring_system epss
scoring_elements 0.79989
published_at 2026-04-12T12:55:00Z
8
value 0.01335
scoring_system epss
scoring_elements 0.79981
published_at 2026-04-13T12:55:00Z
9
value 0.01335
scoring_system epss
scoring_elements 0.80009
published_at 2026-04-16T12:55:00Z
10
value 0.0144
scoring_system epss
scoring_elements 0.80785
published_at 2026-04-26T12:55:00Z
11
value 0.0144
scoring_system epss
scoring_elements 0.80798
published_at 2026-04-29T12:55:00Z
12
value 0.0144
scoring_system epss
scoring_elements 0.80756
published_at 2026-04-18T12:55:00Z
13
value 0.0144
scoring_system epss
scoring_elements 0.80758
published_at 2026-04-21T12:55:00Z
14
value 0.0144
scoring_system epss
scoring_elements 0.80781
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1120
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120
4
reference_url http://seclists.org/oss-sec/2018/q2/122
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2018/q2/122
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
8
reference_url https://www.exploit-db.com/exploits/44806/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44806/
9
reference_url http://www.securityfocus.com/bid/104229
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104229
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575472
reference_id 1575472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575472
11
reference_url https://security.archlinux.org/AVG-701
reference_id AVG-701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-701
12
reference_url https://security.archlinux.org/AVG-702
reference_id AVG-702
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-702
13
reference_url https://security.archlinux.org/AVG-703
reference_id AVG-703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-703
14
reference_url https://security.archlinux.org/AVG-704
reference_id AVG-704
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-704
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1120
reference_id CVE-2018-1120
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
2
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1120
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44806.txt
reference_id CVE-2018-1124;CVE-2018-1123;CVE-2018-1122;CVE-2018-1121;CVE-2018-1120
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44806.txt
25
reference_url https://security.gentoo.org/glsa/201805-14
reference_id GLSA-201805-14
reference_type
scores
url https://security.gentoo.org/glsa/201805-14
26
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
27
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
28
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
29
reference_url https://access.redhat.com/errata/RHSA-2020:3804
reference_id RHSA-2020:3804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3804
30
reference_url https://access.redhat.com/errata/RHSA-2020:3810
reference_id RHSA-2020:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3810
31
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
32
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
33
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
34
reference_url https://usn.ubuntu.com/3910-1/
reference_id USN-3910-1
reference_type
scores
url https://usn.ubuntu.com/3910-1/
35
reference_url https://usn.ubuntu.com/3910-2/
reference_id USN-3910-2
reference_type
scores
url https://usn.ubuntu.com/3910-2/
fixed_packages
aliases CVE-2018-1120
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjfv-v9np-vkek
38
url VCID-wdsb-7y8b-ryb2
vulnerability_id VCID-wdsb-7y8b-ryb2
summary kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5344.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5344
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20016
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20164
published_at 2026-04-02T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-04T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19949
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20088
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20105
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20059
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20001
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19982
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19986
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19981
published_at 2026-04-21T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19872
published_at 2026-04-24T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-26T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.19836
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533909
reference_id 1533909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533909
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
9
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
10
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
11
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
12
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
13
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
14
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
15
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2018-5344
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdsb-7y8b-ryb2
39
url VCID-wx7h-k8ts-zfax
vulnerability_id VCID-wx7h-k8ts-zfax
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5390.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5390
reference_id
reference_type
scores
0
value 0.10596
scoring_system epss
scoring_elements 0.93311
published_at 2026-04-29T12:55:00Z
1
value 0.11423
scoring_system epss
scoring_elements 0.93539
published_at 2026-04-01T12:55:00Z
2
value 0.11423
scoring_system epss
scoring_elements 0.93594
published_at 2026-04-16T12:55:00Z
3
value 0.11423
scoring_system epss
scoring_elements 0.93601
published_at 2026-04-18T12:55:00Z
4
value 0.11423
scoring_system epss
scoring_elements 0.93606
published_at 2026-04-21T12:55:00Z
5
value 0.11423
scoring_system epss
scoring_elements 0.9361
published_at 2026-04-24T12:55:00Z
6
value 0.11423
scoring_system epss
scoring_elements 0.93609
published_at 2026-04-26T12:55:00Z
7
value 0.11423
scoring_system epss
scoring_elements 0.93549
published_at 2026-04-02T12:55:00Z
8
value 0.11423
scoring_system epss
scoring_elements 0.93557
published_at 2026-04-07T12:55:00Z
9
value 0.11423
scoring_system epss
scoring_elements 0.93566
published_at 2026-04-08T12:55:00Z
10
value 0.11423
scoring_system epss
scoring_elements 0.93569
published_at 2026-04-09T12:55:00Z
11
value 0.11423
scoring_system epss
scoring_elements 0.93575
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5390
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1601704
reference_id 1601704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1601704
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905751
reference_id 905751
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905751
7
reference_url https://security.archlinux.org/ASA-201808-4
reference_id ASA-201808-4
reference_type
scores
url https://security.archlinux.org/ASA-201808-4
8
reference_url https://security.archlinux.org/ASA-201808-5
reference_id ASA-201808-5
reference_type
scores
url https://security.archlinux.org/ASA-201808-5
9
reference_url https://security.archlinux.org/ASA-201808-6
reference_id ASA-201808-6
reference_type
scores
url https://security.archlinux.org/ASA-201808-6
10
reference_url https://security.archlinux.org/ASA-201808-7
reference_id ASA-201808-7
reference_type
scores
url https://security.archlinux.org/ASA-201808-7
11
reference_url https://security.archlinux.org/AVG-747
reference_id AVG-747
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-747
12
reference_url https://security.archlinux.org/AVG-748
reference_id AVG-748
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-748
13
reference_url https://security.archlinux.org/AVG-749
reference_id AVG-749
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-749
14
reference_url https://security.archlinux.org/AVG-750
reference_id AVG-750
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-750
15
reference_url https://access.redhat.com/errata/RHSA-2018:2384
reference_id RHSA-2018:2384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2384
16
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
17
reference_url https://access.redhat.com/errata/RHSA-2018:2395
reference_id RHSA-2018:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2395
18
reference_url https://access.redhat.com/errata/RHSA-2018:2402
reference_id RHSA-2018:2402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2402
19
reference_url https://access.redhat.com/errata/RHSA-2018:2403
reference_id RHSA-2018:2403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2403
20
reference_url https://access.redhat.com/errata/RHSA-2018:2645
reference_id RHSA-2018:2645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2645
21
reference_url https://access.redhat.com/errata/RHSA-2018:2776
reference_id RHSA-2018:2776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2776
22
reference_url https://access.redhat.com/errata/RHSA-2018:2785
reference_id RHSA-2018:2785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2785
23
reference_url https://access.redhat.com/errata/RHSA-2018:2789
reference_id RHSA-2018:2789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2789
24
reference_url https://access.redhat.com/errata/RHSA-2018:2790
reference_id RHSA-2018:2790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2790
25
reference_url https://access.redhat.com/errata/RHSA-2018:2791
reference_id RHSA-2018:2791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2791
26
reference_url https://access.redhat.com/errata/RHSA-2018:2924
reference_id RHSA-2018:2924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2924
27
reference_url https://access.redhat.com/errata/RHSA-2018:2933
reference_id RHSA-2018:2933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2933
28
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
29
reference_url https://usn.ubuntu.com/3732-1/
reference_id USN-3732-1
reference_type
scores
url https://usn.ubuntu.com/3732-1/
30
reference_url https://usn.ubuntu.com/3732-2/
reference_id USN-3732-2
reference_type
scores
url https://usn.ubuntu.com/3732-2/
31
reference_url https://usn.ubuntu.com/3741-1/
reference_id USN-3741-1
reference_type
scores
url https://usn.ubuntu.com/3741-1/
32
reference_url https://usn.ubuntu.com/3741-2/
reference_id USN-3741-2
reference_type
scores
url https://usn.ubuntu.com/3741-2/
33
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
34
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
35
reference_url https://usn.ubuntu.com/3763-1/
reference_id USN-3763-1
reference_type
scores
url https://usn.ubuntu.com/3763-1/
fixed_packages
aliases CVE-2018-5390
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wx7h-k8ts-zfax
40
url VCID-y582-8ggd-2qfb
vulnerability_id VCID-y582-8ggd-2qfb
summary kernel: Stack-based buffer overflow in drivers/scsi/sr_ioctl.c allows denial of service or other unspecified impact
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f7068114d45ec55996b9040e98111afa56e010fe
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f7068114d45ec55996b9040e98111afa56e010fe
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11506.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11506.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11506
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23064
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.22906
published_at 2026-04-29T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23081
published_at 2026-04-21T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.22915
published_at 2026-04-24T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.22909
published_at 2026-04-26T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23229
published_at 2026-04-02T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23273
published_at 2026-04-04T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23062
published_at 2026-04-07T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23136
published_at 2026-04-08T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23187
published_at 2026-04-09T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23208
published_at 2026-04-11T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23171
published_at 2026-04-12T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.23113
published_at 2026-04-13T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.23127
published_at 2026-04-16T12:55:00Z
14
value 0.00078
scoring_system epss
scoring_elements 0.23119
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11506
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11506
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe
6
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
9
reference_url https://twitter.com/efrmv/status/1001574894273007616
reference_id
reference_type
scores
url https://twitter.com/efrmv/status/1001574894273007616
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1583210
reference_id 1583210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1583210
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-11506
reference_id CVE-2018-11506
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-11506
16
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
17
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
18
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
19
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
fixed_packages
aliases CVE-2018-11506
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y582-8ggd-2qfb
41
url VCID-y7pd-q1g1-k7bk
vulnerability_id VCID-y7pd-q1g1-k7bk
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17806.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17806.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17806
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01228
published_at 2026-04-01T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01326
published_at 2026-04-29T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01242
published_at 2026-04-11T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01237
published_at 2026-04-12T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.0124
published_at 2026-04-13T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01233
published_at 2026-04-16T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01245
published_at 2026-04-18T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01319
published_at 2026-04-21T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01325
published_at 2026-04-24T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01329
published_at 2026-04-26T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01238
published_at 2026-04-02T12:55:00Z
11
value 0.00011
scoring_system epss
scoring_elements 0.01244
published_at 2026-04-04T12:55:00Z
12
value 0.00011
scoring_system epss
scoring_elements 0.01252
published_at 2026-04-07T12:55:00Z
13
value 0.00011
scoring_system epss
scoring_elements 0.01258
published_at 2026-04-08T12:55:00Z
14
value 0.00011
scoring_system epss
scoring_elements 0.01262
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17806
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
29
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:P/A:P
1
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
30
reference_url https://github.com/torvalds/linux/commit/af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1
31
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
32
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
33
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
34
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
35
reference_url http://www.securityfocus.com/bid/102293
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102293
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1528323
reference_id 1528323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1528323
37
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
38
reference_url https://security.archlinux.org/ASA-201801-2
reference_id ASA-201801-2
reference_type
scores
url https://security.archlinux.org/ASA-201801-2
39
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
40
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
41
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
42
reference_url https://security.archlinux.org/AVG-561
reference_id AVG-561
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-561
43
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
44
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17806
reference_id CVE-2017-17806
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17806
62
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
63
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
64
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
65
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
66
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
67
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
68
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
69
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
70
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-17806
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7pd-q1g1-k7bk
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-alt@4.14.0-115%3Farch=el7a