Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@3.10.0-957?arch=el7
Typerpm
Namespaceredhat
Namekernel
Version3.10.0-957
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1jsy-xbqr-2ff3
vulnerability_id VCID-1jsy-xbqr-2ff3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7740.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7740
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25483
published_at 2026-04-01T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25551
published_at 2026-04-02T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25588
published_at 2026-04-04T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-07T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25429
published_at 2026-04-08T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25476
published_at 2026-04-09T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25488
published_at 2026-04-11T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25446
published_at 2026-04-12T12:55:00Z
8
value 0.0009
scoring_system epss
scoring_elements 0.25392
published_at 2026-04-13T12:55:00Z
9
value 0.0009
scoring_system epss
scoring_elements 0.25399
published_at 2026-04-16T12:55:00Z
10
value 0.0009
scoring_system epss
scoring_elements 0.25389
published_at 2026-04-18T12:55:00Z
11
value 0.0009
scoring_system epss
scoring_elements 0.25359
published_at 2026-04-21T12:55:00Z
12
value 0.0009
scoring_system epss
scoring_elements 0.25321
published_at 2026-04-24T12:55:00Z
13
value 0.0009
scoring_system epss
scoring_elements 0.25315
published_at 2026-04-26T12:55:00Z
14
value 0.0009
scoring_system epss
scoring_elements 0.25268
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552867
reference_id 1552867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552867
48
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
49
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
50
reference_url https://usn.ubuntu.com/3910-1/
reference_id USN-3910-1
reference_type
scores
url https://usn.ubuntu.com/3910-1/
51
reference_url https://usn.ubuntu.com/3910-2/
reference_id USN-3910-2
reference_type
scores
url https://usn.ubuntu.com/3910-2/
fixed_packages
aliases CVE-2018-7740
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jsy-xbqr-2ff3
1
url VCID-1yjm-d71x-9fh4
vulnerability_id VCID-1yjm-d71x-9fh4
summary kernel: AIO write triggers integer overflow in some protocols
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c185ce06dca14f5cea192f5a2c981ef50663f2b
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c185ce06dca14f5cea192f5a2c981ef50663f2b
1
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4f4b82694fe48b02f7a881a1797131a6dad1364
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4f4b82694fe48b02f7a881a1797131a6dad1364
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8830.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8830
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.17849
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-26T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18036
published_at 2026-04-01T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.182
published_at 2026-04-02T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18253
published_at 2026-04-04T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.17954
published_at 2026-04-07T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.1804
published_at 2026-04-08T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.181
published_at 2026-04-09T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18109
published_at 2026-04-11T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18065
published_at 2026-04-12T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18015
published_at 2026-04-13T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.17957
published_at 2026-04-16T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.17968
published_at 2026-04-18T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18
published_at 2026-04-21T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.17908
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8830
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830
5
reference_url https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b
6
reference_url https://github.com/torvalds/linux/commit/c4f4b82694fe48b02f7a881a1797131a6dad1364
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/c4f4b82694fe48b02f7a881a1797131a6dad1364
7
reference_url http://www.debian.org/security/2016/dsa-3503
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3503
8
reference_url http://www.openwall.com/lists/oss-security/2016/03/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/03/02/9
9
reference_url http://www.ubuntu.com/usn/USN-2968-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2968-1
10
reference_url http://www.ubuntu.com/usn/USN-2968-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2968-2
11
reference_url http://www.ubuntu.com/usn/USN-2969-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2969-1
12
reference_url http://www.ubuntu.com/usn/USN-2970-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2970-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1314275
reference_id 1314275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1314275
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8830
reference_id CVE-2015-8830
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8830
16
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
17
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
18
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
19
reference_url https://usn.ubuntu.com/2968-1/
reference_id USN-2968-1
reference_type
scores
url https://usn.ubuntu.com/2968-1/
20
reference_url https://usn.ubuntu.com/2968-2/
reference_id USN-2968-2
reference_type
scores
url https://usn.ubuntu.com/2968-2/
21
reference_url https://usn.ubuntu.com/2969-1/
reference_id USN-2969-1
reference_type
scores
url https://usn.ubuntu.com/2969-1/
22
reference_url https://usn.ubuntu.com/2970-1/
reference_id USN-2970-1
reference_type
scores
url https://usn.ubuntu.com/2970-1/
fixed_packages
aliases CVE-2015-8830
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1yjm-d71x-9fh4
2
url VCID-27ad-tyfj-fqes
vulnerability_id VCID-27ad-tyfj-fqes
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10902.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10902.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10902
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11608
published_at 2026-04-29T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.1177
published_at 2026-04-13T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11634
published_at 2026-04-18T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11755
published_at 2026-04-21T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11723
published_at 2026-04-24T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11685
published_at 2026-04-26T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23461
published_at 2026-04-09T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23481
published_at 2026-04-11T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23442
published_at 2026-04-12T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23344
published_at 2026-04-01T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23411
published_at 2026-04-08T12:55:00Z
11
value 0.00079
scoring_system epss
scoring_elements 0.23518
published_at 2026-04-02T12:55:00Z
12
value 0.00079
scoring_system epss
scoring_elements 0.23555
published_at 2026-04-04T12:55:00Z
13
value 0.00079
scoring_system epss
scoring_elements 0.23338
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10902
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13099
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590720
reference_id 1590720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590720
22
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
23
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
24
reference_url https://access.redhat.com/errata/RHSA-2019:0415
reference_id RHSA-2019:0415
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0415
25
reference_url https://access.redhat.com/errata/RHSA-2019:0641
reference_id RHSA-2019:0641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0641
26
reference_url https://access.redhat.com/errata/RHSA-2019:3217
reference_id RHSA-2019:3217
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3217
27
reference_url https://access.redhat.com/errata/RHSA-2019:3967
reference_id RHSA-2019:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3967
28
reference_url https://usn.ubuntu.com/3776-1/
reference_id USN-3776-1
reference_type
scores
url https://usn.ubuntu.com/3776-1/
29
reference_url https://usn.ubuntu.com/3776-2/
reference_id USN-3776-2
reference_type
scores
url https://usn.ubuntu.com/3776-2/
30
reference_url https://usn.ubuntu.com/3847-1/
reference_id USN-3847-1
reference_type
scores
url https://usn.ubuntu.com/3847-1/
31
reference_url https://usn.ubuntu.com/3847-2/
reference_id USN-3847-2
reference_type
scores
url https://usn.ubuntu.com/3847-2/
32
reference_url https://usn.ubuntu.com/3847-3/
reference_id USN-3847-3
reference_type
scores
url https://usn.ubuntu.com/3847-3/
33
reference_url https://usn.ubuntu.com/3849-1/
reference_id USN-3849-1
reference_type
scores
url https://usn.ubuntu.com/3849-1/
34
reference_url https://usn.ubuntu.com/3849-2/
reference_id USN-3849-2
reference_type
scores
url https://usn.ubuntu.com/3849-2/
fixed_packages
aliases CVE-2018-10902
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-27ad-tyfj-fqes
3
url VCID-4tc5-gj85-kfag
vulnerability_id VCID-4tc5-gj85-kfag
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
1
reference_url http://openwall.com/lists/oss-security/2018/07/13/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/07/13/2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13405.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-13405.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-13405
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.34786
published_at 2026-04-29T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.3519
published_at 2026-04-16T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35176
published_at 2026-04-18T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35127
published_at 2026-04-21T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.34893
published_at 2026-04-24T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-26T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37659
published_at 2026-04-04T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37589
published_at 2026-04-08T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37602
published_at 2026-04-09T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37616
published_at 2026-04-11T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37582
published_at 2026-04-12T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37554
published_at 2026-04-13T12:55:00Z
12
value 0.00165
scoring_system epss
scoring_elements 0.3747
published_at 2026-04-01T12:55:00Z
13
value 0.00165
scoring_system epss
scoring_elements 0.37635
published_at 2026-04-02T12:55:00Z
14
value 0.00165
scoring_system epss
scoring_elements 0.37537
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-13405
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=0b3369840cd61c23e2b9241093737b4c395cb406
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=0b3369840cd61c23e2b9241093737b4c395cb406
9
reference_url https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRBNBX73SAFKQWBOX76SLMWPTKJPVGEJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRBNBX73SAFKQWBOX76SLMWPTKJPVGEJ/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKKIAUMR5FAYLZ7HLEPOXMKAAE3BYBQ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKKIAUMR5FAYLZ7HLEPOXMKAAE3BYBQ/
12
reference_url https://support.f5.com/csp/article/K00854051
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K00854051
13
reference_url https://twitter.com/grsecurity/status/1015082951204327425
reference_id
reference_type
scores
url https://twitter.com/grsecurity/status/1015082951204327425
14
reference_url https://www.debian.org/security/2018/dsa-4266
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4266
15
reference_url https://www.exploit-db.com/exploits/45033/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/45033/
16
reference_url http://www.securityfocus.com/bid/106503
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106503
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1599161
reference_id 1599161
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1599161
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:15.1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:16.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:16.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:15.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:16.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:16.0.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:15.1.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:16.0.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:15.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:16.0.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:15.1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:16.0.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:15.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_fraud_protection_service:16.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:15.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:16.0.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:15.1.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:16.0.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:15.1.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:16.0.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:16.0.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:15.1.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:16.0.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
84
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1611
reference_id CVE-2018-13405
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1611
85
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45033.c
reference_id CVE-2018-13405
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45033.c
86
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-13405
reference_id CVE-2018-13405
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-13405
87
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
88
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
89
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
90
reference_url https://access.redhat.com/errata/RHSA-2019:0717
reference_id RHSA-2019:0717
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0717
91
reference_url https://access.redhat.com/errata/RHSA-2019:2476
reference_id RHSA-2019:2476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2476
92
reference_url https://access.redhat.com/errata/RHSA-2019:2566
reference_id RHSA-2019:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2566
93
reference_url https://access.redhat.com/errata/RHSA-2019:2696
reference_id RHSA-2019:2696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2696
94
reference_url https://access.redhat.com/errata/RHSA-2019:2730
reference_id RHSA-2019:2730
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2730
95
reference_url https://access.redhat.com/errata/RHSA-2019:4159
reference_id RHSA-2019:4159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4159
96
reference_url https://access.redhat.com/errata/RHSA-2019:4164
reference_id RHSA-2019:4164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4164
97
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
98
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
99
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
100
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
101
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
102
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-13405
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4tc5-gj85-kfag
4
url VCID-683b-87c7-93a5
vulnerability_id VCID-683b-87c7-93a5
summary kernel: Inifinite loop vulnerability in mm/madvise.c:madvise_willneed() function allows local denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18208.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18208
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15694
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15796
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15602
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15687
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15746
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15713
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15678
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15613
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.1554
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15549
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15642
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.1564
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15583
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551565
reference_id 1551565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551565
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://access.redhat.com/errata/RHSA-2019:3967
reference_id RHSA-2019:3967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3967
9
reference_url https://access.redhat.com/errata/RHSA-2019:4057
reference_id RHSA-2019:4057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4057
10
reference_url https://access.redhat.com/errata/RHSA-2019:4058
reference_id RHSA-2019:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4058
11
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
12
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
13
reference_url https://usn.ubuntu.com/3653-1/
reference_id USN-3653-1
reference_type
scores
url https://usn.ubuntu.com/3653-1/
14
reference_url https://usn.ubuntu.com/3653-2/
reference_id USN-3653-2
reference_type
scores
url https://usn.ubuntu.com/3653-2/
15
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
16
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
17
reference_url https://usn.ubuntu.com/3657-1/
reference_id USN-3657-1
reference_type
scores
url https://usn.ubuntu.com/3657-1/
fixed_packages
aliases CVE-2017-18208
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-683b-87c7-93a5
5
url VCID-68jc-asgq-1kg9
vulnerability_id VCID-68jc-asgq-1kg9
summary kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10322.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10322
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15962
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15864
published_at 2026-04-29T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15888
published_at 2026-04-21T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-24T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15899
published_at 2026-04-26T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16032
published_at 2026-04-02T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16094
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15887
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15972
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16035
published_at 2026-04-09T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.16012
published_at 2026-04-11T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15974
published_at 2026-04-12T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15906
published_at 2026-04-13T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-16T12:55:00Z
14
value 0.00051
scoring_system epss
scoring_elements 0.15843
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10322
2
reference_url https://bugzilla.kernel.org/show_bug.cgi?id=199377
reference_id
reference_type
scores
url https://bugzilla.kernel.org/show_bug.cgi?id=199377
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.spinics.net/lists/linux-xfs/msg17215.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/linux-xfs/msg17215.html
6
reference_url http://www.securityfocus.com/bid/103960
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103960
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1571623
reference_id 1571623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1571623
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10322
reference_id CVE-2018-10322
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10322
14
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
15
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
16
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
17
reference_url https://usn.ubuntu.com/4578-1/
reference_id USN-4578-1
reference_type
scores
url https://usn.ubuntu.com/4578-1/
18
reference_url https://usn.ubuntu.com/4579-1/
reference_id USN-4579-1
reference_type
scores
url https://usn.ubuntu.com/4579-1/
fixed_packages
aliases CVE-2018-10322
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68jc-asgq-1kg9
6
url VCID-6ytv-3taq-nuhc
vulnerability_id VCID-6ytv-3taq-nuhc
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ecaaab5649781c5a0effdaf298a925063020500e
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17805.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17805.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17805
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05629
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05922
published_at 2026-04-29T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05739
published_at 2026-04-11T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05732
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05726
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-16T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05693
published_at 2026-04-18T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05842
published_at 2026-04-21T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05875
published_at 2026-04-24T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05911
published_at 2026-04-26T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05663
published_at 2026-04-02T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05703
published_at 2026-04-04T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05695
published_at 2026-04-07T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05735
published_at 2026-04-08T12:55:00Z
14
value 0.00021
scoring_system epss
scoring_elements 0.05762
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17805
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16995
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17863
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
29
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
30
reference_url https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/ecaaab5649781c5a0effdaf298a925063020500e
31
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
32
reference_url https://www.debian.org/security/2017/dsa-4073
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4073
33
reference_url https://www.debian.org/security/2018/dsa-4082
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4082
34
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
35
reference_url http://www.securityfocus.com/bid/102291
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102291
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1528312
reference_id 1528312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1528312
37
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
38
reference_url https://security.archlinux.org/ASA-201801-2
reference_id ASA-201801-2
reference_type
scores
url https://security.archlinux.org/ASA-201801-2
39
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
40
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
41
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
42
reference_url https://security.archlinux.org/AVG-561
reference_id AVG-561
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-561
43
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
44
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:extra:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17805
reference_id CVE-2017-17805
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17805
62
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
63
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
64
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
65
reference_url https://access.redhat.com/errata/RHSA-2019:2473
reference_id RHSA-2019:2473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2473
66
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
67
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
68
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
69
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
70
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
71
reference_url https://usn.ubuntu.com/3620-1/
reference_id USN-3620-1
reference_type
scores
url https://usn.ubuntu.com/3620-1/
72
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
url https://usn.ubuntu.com/3620-2/
73
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-17805
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ytv-3taq-nuhc
7
url VCID-8sj2-vr7p-7qgs
vulnerability_id VCID-8sj2-vr7p-7qgs
summary kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10940.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10940.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10940
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17377
published_at 2026-04-16T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.1724
published_at 2026-04-29T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17418
published_at 2026-04-21T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17326
published_at 2026-04-24T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17305
published_at 2026-04-26T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17544
published_at 2026-04-02T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.1759
published_at 2026-04-04T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17372
published_at 2026-04-07T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17463
published_at 2026-04-08T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17523
published_at 2026-04-09T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17536
published_at 2026-04-11T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17487
published_at 2026-04-12T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17434
published_at 2026-04-13T12:55:00Z
13
value 0.00056
scoring_system epss
scoring_elements 0.17386
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10940
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
6
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
9
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
10
reference_url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
reference_id
reference_type
scores
url https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
11
reference_url http://www.securityfocus.com/bid/104154
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104154
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1577408
reference_id 1577408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1577408
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10940
reference_id CVE-2018-10940
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10940
16
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
17
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
18
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
19
reference_url https://usn.ubuntu.com/3676-1/
reference_id USN-3676-1
reference_type
scores
url https://usn.ubuntu.com/3676-1/
20
reference_url https://usn.ubuntu.com/3676-2/
reference_id USN-3676-2
reference_type
scores
url https://usn.ubuntu.com/3676-2/
21
reference_url https://usn.ubuntu.com/3695-1/
reference_id USN-3695-1
reference_type
scores
url https://usn.ubuntu.com/3695-1/
22
reference_url https://usn.ubuntu.com/3695-2/
reference_id USN-3695-2
reference_type
scores
url https://usn.ubuntu.com/3695-2/
23
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-10940
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8sj2-vr7p-7qgs
8
url VCID-95yf-d643-jkhr
vulnerability_id VCID-95yf-d643-jkhr
summary kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10883.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10883
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15424
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15464
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15533
published_at 2026-04-04T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15333
published_at 2026-04-07T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15421
published_at 2026-04-08T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-09T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15432
published_at 2026-04-11T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15393
published_at 2026-04-12T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15328
published_at 2026-04-13T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15247
published_at 2026-04-16T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15251
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15302
published_at 2026-04-21T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15342
published_at 2026-04-24T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15339
published_at 2026-04-26T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15284
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596846
reference_id 1596846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596846
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
9
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
10
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
11
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
12
reference_url https://usn.ubuntu.com/3879-1/
reference_id USN-3879-1
reference_type
scores
url https://usn.ubuntu.com/3879-1/
13
reference_url https://usn.ubuntu.com/3879-2/
reference_id USN-3879-2
reference_type
scores
url https://usn.ubuntu.com/3879-2/
fixed_packages
aliases CVE-2018-10883
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95yf-d643-jkhr
9
url VCID-9p4a-gszq-s3aa
vulnerability_id VCID-9p4a-gszq-s3aa
summary kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10881.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10881
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15112
published_at 2026-04-01T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15152
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.1522
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15024
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15111
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15163
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15131
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15092
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15032
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14927
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14937
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.1499
published_at 2026-04-21T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15028
published_at 2026-04-24T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15031
published_at 2026-04-26T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.14973
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596828
reference_id 1596828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596828
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
9
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
10
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
11
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
12
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
13
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-10881
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9p4a-gszq-s3aa
10
url VCID-b77n-fg17-zybj
vulnerability_id VCID-b77n-fg17-zybj
summary kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10878.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10878
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16858
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16915
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.167
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16785
published_at 2026-04-08T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.1684
published_at 2026-04-09T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16819
published_at 2026-04-11T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16775
published_at 2026-04-12T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16717
published_at 2026-04-13T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16652
published_at 2026-04-16T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.1666
published_at 2026-04-18T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16698
published_at 2026-04-21T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16601
published_at 2026-04-24T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.1659
published_at 2026-04-26T12:55:00Z
14
value 0.00053
scoring_system epss
scoring_elements 0.16555
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596802
reference_id 1596802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596802
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
9
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
10
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
11
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
12
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
13
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10878
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b77n-fg17-zybj
11
url VCID-bq4k-frp2-jkda
vulnerability_id VCID-bq4k-frp2-jkda
summary kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1118.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1118.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1118
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29067
published_at 2026-04-01T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.28675
published_at 2026-04-29T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29024
published_at 2026-04-18T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.28978
published_at 2026-04-21T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.28858
published_at 2026-04-24T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.28745
published_at 2026-04-26T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29142
published_at 2026-04-02T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29191
published_at 2026-04-04T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29001
published_at 2026-04-07T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29065
published_at 2026-04-08T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29107
published_at 2026-04-09T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29113
published_at 2026-04-11T12:55:00Z
12
value 0.00108
scoring_system epss
scoring_elements 0.29069
published_at 2026-04-12T12:55:00Z
13
value 0.00108
scoring_system epss
scoring_elements 0.29018
published_at 2026-04-13T12:55:00Z
14
value 0.00108
scoring_system epss
scoring_elements 0.29047
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1118
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1573699
reference_id 1573699
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1573699
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1118
reference_id CVE-2018-1118
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
2
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-1118
16
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
17
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
18
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
19
reference_url https://usn.ubuntu.com/3762-1/
reference_id USN-3762-1
reference_type
scores
url https://usn.ubuntu.com/3762-1/
20
reference_url https://usn.ubuntu.com/3762-2/
reference_id USN-3762-2
reference_type
scores
url https://usn.ubuntu.com/3762-2/
fixed_packages
aliases CVE-2018-1118
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bq4k-frp2-jkda
12
url VCID-bquu-fuhh-7qha
vulnerability_id VCID-bquu-fuhh-7qha
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5803
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18702
published_at 2026-04-29T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18876
published_at 2026-04-21T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18765
published_at 2026-04-24T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18746
published_at 2026-04-26T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-02T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-04T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25175
published_at 2026-04-07T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25244
published_at 2026-04-08T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25303
published_at 2026-04-11T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25261
published_at 2026-04-12T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25208
published_at 2026-04-13T12:55:00Z
11
value 0.00089
scoring_system epss
scoring_elements 0.25217
published_at 2026-04-16T12:55:00Z
12
value 0.00089
scoring_system epss
scoring_elements 0.25207
published_at 2026-04-18T12:55:00Z
13
value 0.00089
scoring_system epss
scoring_elements 0.25289
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5803
2
reference_url https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
3
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
5
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
6
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
7
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
52
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
53
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
54
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
55
reference_url https://secuniaresearch.flexerasoftware.com/advisories/81331/
reference_id
reference_type
scores
url https://secuniaresearch.flexerasoftware.com/advisories/81331/
56
reference_url https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
reference_id
reference_type
scores
url https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
57
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
58
reference_url https://www.debian.org/security/2018/dsa-4188
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4188
59
reference_url https://www.spinics.net/lists/linux-sctp/msg07036.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/linux-sctp/msg07036.html
60
reference_url https://www.spinics.net/lists/netdev/msg482523.html
reference_id
reference_type
scores
url https://www.spinics.net/lists/netdev/msg482523.html
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1551051
reference_id 1551051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1551051
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5803
reference_id CVE-2018-5803
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5803
71
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
72
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
73
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
74
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
75
reference_url https://access.redhat.com/errata/RHSA-2019:0641
reference_id RHSA-2019:0641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0641
76
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
77
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
78
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
79
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
80
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
81
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
82
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-5803
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bquu-fuhh-7qha
13
url VCID-cec5-67y6-2ybs
vulnerability_id VCID-cec5-67y6-2ybs
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7757.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7757.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7757
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2789
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27946
published_at 2026-04-02T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27986
published_at 2026-04-04T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27778
published_at 2026-04-07T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27845
published_at 2026-04-08T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27887
published_at 2026-04-09T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27892
published_at 2026-04-11T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2785
published_at 2026-04-12T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.27634
published_at 2026-04-29T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.27962
published_at 2026-04-13T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.27971
published_at 2026-04-16T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.27954
published_at 2026-04-18T12:55:00Z
12
value 0.00102
scoring_system epss
scoring_elements 0.27905
published_at 2026-04-21T12:55:00Z
13
value 0.00102
scoring_system epss
scoring_elements 0.2782
published_at 2026-04-24T12:55:00Z
14
value 0.00102
scoring_system epss
scoring_elements 0.27708
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7757
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553361
reference_id 1553361
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553361
48
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
49
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
50
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
51
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
52
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
53
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
54
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
55
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
56
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
57
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-7757
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cec5-67y6-2ybs
14
url VCID-e6h3-w8qc-xufh
vulnerability_id VCID-e6h3-w8qc-xufh
summary kernel: Handling of might_cancel queueing is not properly pretected against race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10661.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10661
reference_id
reference_type
scores
0
value 0.25699
scoring_system epss
scoring_elements 0.96262
published_at 2026-04-29T12:55:00Z
1
value 0.25699
scoring_system epss
scoring_elements 0.96257
published_at 2026-04-21T12:55:00Z
2
value 0.25699
scoring_system epss
scoring_elements 0.96258
published_at 2026-04-24T12:55:00Z
3
value 0.25699
scoring_system epss
scoring_elements 0.9626
published_at 2026-04-26T12:55:00Z
4
value 0.30004
scoring_system epss
scoring_elements 0.96629
published_at 2026-04-02T12:55:00Z
5
value 0.30004
scoring_system epss
scoring_elements 0.96637
published_at 2026-04-07T12:55:00Z
6
value 0.30004
scoring_system epss
scoring_elements 0.96645
published_at 2026-04-08T12:55:00Z
7
value 0.30004
scoring_system epss
scoring_elements 0.96647
published_at 2026-04-09T12:55:00Z
8
value 0.30004
scoring_system epss
scoring_elements 0.96649
published_at 2026-04-11T12:55:00Z
9
value 0.30004
scoring_system epss
scoring_elements 0.9665
published_at 2026-04-12T12:55:00Z
10
value 0.30004
scoring_system epss
scoring_elements 0.96652
published_at 2026-04-13T12:55:00Z
11
value 0.30004
scoring_system epss
scoring_elements 0.96659
published_at 2026-04-16T12:55:00Z
12
value 0.30004
scoring_system epss
scoring_elements 0.96663
published_at 2026-04-18T12:55:00Z
13
value 0.30004
scoring_system epss
scoring_elements 0.9662
published_at 2026-04-01T12:55:00Z
14
value 0.30004
scoring_system epss
scoring_elements 0.96634
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1481136
reference_id 1481136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1481136
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43345.c
reference_id CVE-2017-10661
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43345.c
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://access.redhat.com/errata/RHSA-2019:4057
reference_id RHSA-2019:4057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4057
9
reference_url https://access.redhat.com/errata/RHSA-2019:4058
reference_id RHSA-2019:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4058
10
reference_url https://access.redhat.com/errata/RHSA-2020:0036
reference_id RHSA-2020:0036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0036
11
reference_url https://usn.ubuntu.com/3470-1/
reference_id USN-3470-1
reference_type
scores
url https://usn.ubuntu.com/3470-1/
12
reference_url https://usn.ubuntu.com/3470-2/
reference_id USN-3470-2
reference_type
scores
url https://usn.ubuntu.com/3470-2/
fixed_packages
aliases CVE-2017-10661
risk_score 9.6
exploitability 2.0
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6h3-w8qc-xufh
15
url VCID-emks-s3rq-sqce
vulnerability_id VCID-emks-s3rq-sqce
summary kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000026.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000026
reference_id
reference_type
scores
0
value 0.00865
scoring_system epss
scoring_elements 0.75068
published_at 2026-04-01T12:55:00Z
1
value 0.00865
scoring_system epss
scoring_elements 0.75071
published_at 2026-04-02T12:55:00Z
2
value 0.00865
scoring_system epss
scoring_elements 0.751
published_at 2026-04-04T12:55:00Z
3
value 0.00865
scoring_system epss
scoring_elements 0.75077
published_at 2026-04-07T12:55:00Z
4
value 0.00865
scoring_system epss
scoring_elements 0.75111
published_at 2026-04-08T12:55:00Z
5
value 0.00865
scoring_system epss
scoring_elements 0.75122
published_at 2026-04-09T12:55:00Z
6
value 0.00865
scoring_system epss
scoring_elements 0.75144
published_at 2026-04-11T12:55:00Z
7
value 0.00865
scoring_system epss
scoring_elements 0.75123
published_at 2026-04-12T12:55:00Z
8
value 0.00865
scoring_system epss
scoring_elements 0.75112
published_at 2026-04-13T12:55:00Z
9
value 0.00865
scoring_system epss
scoring_elements 0.75149
published_at 2026-04-16T12:55:00Z
10
value 0.00865
scoring_system epss
scoring_elements 0.75156
published_at 2026-04-18T12:55:00Z
11
value 0.00865
scoring_system epss
scoring_elements 0.75146
published_at 2026-04-21T12:55:00Z
12
value 0.00865
scoring_system epss
scoring_elements 0.75185
published_at 2026-04-24T12:55:00Z
13
value 0.00865
scoring_system epss
scoring_elements 0.75188
published_at 2026-04-26T12:55:00Z
14
value 0.00865
scoring_system epss
scoring_elements 0.75192
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000026
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1541846
reference_id 1541846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1541846
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
9
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
10
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
11
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
12
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
13
reference_url https://usn.ubuntu.com/3620-1/
reference_id USN-3620-1
reference_type
scores
url https://usn.ubuntu.com/3620-1/
14
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
url https://usn.ubuntu.com/3620-2/
15
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2018-1000026
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-emks-s3rq-sqce
16
url VCID-es33-k15y-7qa6
vulnerability_id VCID-es33-k15y-7qa6
summary security update
references
0
reference_url http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html
reference_id
reference_type
scores
url http://lists.alioth.debian.org/pipermail/secure-testing-commits/2017-December/059967.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0861.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-0861.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-0861
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24655
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24448
published_at 2026-04-29T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24559
published_at 2026-04-21T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24503
published_at 2026-04-24T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24489
published_at 2026-04-26T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24731
published_at 2026-04-02T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.2477
published_at 2026-04-04T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24543
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24614
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24661
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24677
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.2458
published_at 2026-04-13T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24592
published_at 2026-04-16T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24583
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-0861
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
36
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
37
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
38
reference_url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
reference_id
reference_type
scores
url https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
39
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
40
reference_url https://security-tracker.debian.org/tracker/CVE-2017-0861
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2017-0861
41
reference_url https://source.android.com/security/bulletin/pixel/2017-11-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2017-11-01
42
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
43
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2020.html
44
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
45
reference_url http://www.securityfocus.com/bid/102329
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102329
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1563994
reference_id 1563994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1563994
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-0861
reference_id CVE-2017-0861
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-0861
49
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
50
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
51
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
52
reference_url https://access.redhat.com/errata/RHSA-2020:0036
reference_id RHSA-2020:0036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0036
53
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
54
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
55
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
56
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
57
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
58
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
59
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
60
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2017-0861
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-es33-k15y-7qa6
17
url VCID-fbz3-mvsn-b7fu
vulnerability_id VCID-fbz3-mvsn-b7fu
summary kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1130.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1130
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13999
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13842
published_at 2026-04-29T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13904
published_at 2026-04-21T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13936
published_at 2026-04-24T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.1391
published_at 2026-04-26T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.14072
published_at 2026-04-02T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.14125
published_at 2026-04-04T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13931
published_at 2026-04-07T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.14014
published_at 2026-04-08T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.14067
published_at 2026-04-09T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.14021
published_at 2026-04-11T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13984
published_at 2026-04-12T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13935
published_at 2026-04-13T12:55:00Z
13
value 0.00045
scoring_system epss
scoring_elements 0.13838
published_at 2026-04-16T12:55:00Z
14
value 0.00045
scoring_system epss
scoring_elements 0.13832
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1130
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
6
reference_url https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
9
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
10
reference_url https://marc.info/?l=linux-netdev&m=152036596825220&w=2
reference_id
reference_type
scores
url https://marc.info/?l=linux-netdev&m=152036596825220&w=2
11
reference_url https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94
reference_id
reference_type
scores
url https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576419
reference_id 1576419
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576419
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1130
reference_id CVE-2018-1130
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1130
28
reference_url https://access.redhat.com/errata/RHSA-2018:1854
reference_id RHSA-2018:1854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1854
29
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
30
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
31
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
32
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
33
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
34
reference_url https://usn.ubuntu.com/3697-1/
reference_id USN-3697-1
reference_type
scores
url https://usn.ubuntu.com/3697-1/
35
reference_url https://usn.ubuntu.com/3697-2/
reference_id USN-3697-2
reference_type
scores
url https://usn.ubuntu.com/3697-2/
36
reference_url https://usn.ubuntu.com/3698-1/
reference_id USN-3698-1
reference_type
scores
url https://usn.ubuntu.com/3698-1/
37
reference_url https://usn.ubuntu.com/3698-2/
reference_id USN-3698-2
reference_type
scores
url https://usn.ubuntu.com/3698-2/
fixed_packages
aliases CVE-2018-1130
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fbz3-mvsn-b7fu
18
url VCID-j26e-qn4j-euej
vulnerability_id VCID-j26e-qn4j-euej
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1092.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1092
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.46805
published_at 2026-04-01T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46843
published_at 2026-04-02T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46861
published_at 2026-04-04T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.4681
published_at 2026-04-07T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46864
published_at 2026-04-09T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46887
published_at 2026-04-11T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-12T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46867
published_at 2026-04-13T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46922
published_at 2026-04-16T12:55:00Z
9
value 0.00238
scoring_system epss
scoring_elements 0.46919
published_at 2026-04-18T12:55:00Z
10
value 0.00238
scoring_system epss
scoring_elements 0.46868
published_at 2026-04-21T12:55:00Z
11
value 0.00238
scoring_system epss
scoring_elements 0.46852
published_at 2026-04-24T12:55:00Z
12
value 0.00238
scoring_system epss
scoring_elements 0.46862
published_at 2026-04-26T12:55:00Z
13
value 0.00238
scoring_system epss
scoring_elements 0.46812
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1092
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560777
reference_id 1560777
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560777
48
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
49
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
50
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
51
reference_url https://usn.ubuntu.com/3676-1/
reference_id USN-3676-1
reference_type
scores
url https://usn.ubuntu.com/3676-1/
52
reference_url https://usn.ubuntu.com/3676-2/
reference_id USN-3676-2
reference_type
scores
url https://usn.ubuntu.com/3676-2/
53
reference_url https://usn.ubuntu.com/3677-1/
reference_id USN-3677-1
reference_type
scores
url https://usn.ubuntu.com/3677-1/
54
reference_url https://usn.ubuntu.com/3677-2/
reference_id USN-3677-2
reference_type
scores
url https://usn.ubuntu.com/3677-2/
55
reference_url https://usn.ubuntu.com/3678-1/
reference_id USN-3678-1
reference_type
scores
url https://usn.ubuntu.com/3678-1/
56
reference_url https://usn.ubuntu.com/3678-2/
reference_id USN-3678-2
reference_type
scores
url https://usn.ubuntu.com/3678-2/
57
reference_url https://usn.ubuntu.com/3678-3/
reference_id USN-3678-3
reference_type
scores
url https://usn.ubuntu.com/3678-3/
58
reference_url https://usn.ubuntu.com/3678-4/
reference_id USN-3678-4
reference_type
scores
url https://usn.ubuntu.com/3678-4/
59
reference_url https://usn.ubuntu.com/3754-1/
reference_id USN-3754-1
reference_type
scores
url https://usn.ubuntu.com/3754-1/
fixed_packages
aliases CVE-2018-1092
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j26e-qn4j-euej
19
url VCID-kcmx-k8xf-efhs
vulnerability_id VCID-kcmx-k8xf-efhs
summary security update
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99d825822eade8d827a1817357cbf3f889a552d6
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4913.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4913.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4913
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24448
published_at 2026-04-29T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24558
published_at 2026-04-21T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24502
published_at 2026-04-24T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24489
published_at 2026-04-26T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24655
published_at 2026-04-01T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-02T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.2477
published_at 2026-04-04T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24543
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24614
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24661
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24677
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-12T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.2458
published_at 2026-04-13T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24592
published_at 2026-04-16T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24582
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4913
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3955
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3961
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5243
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/99d825822eade8d827a1817357cbf3f889a552d6
44
reference_url http://www.debian.org/security/2016/dsa-3607
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3607
45
reference_url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
reference_id
reference_type
scores
url http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
46
reference_url http://www.openwall.com/lists/oss-security/2016/05/18/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/18/3
47
reference_url http://www.openwall.com/lists/oss-security/2016/05/18/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/18/5
48
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
49
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
50
reference_url http://www.securityfocus.com/bid/90730
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90730
51
reference_url http://www.ubuntu.com/usn/USN-3016-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3016-1
52
reference_url http://www.ubuntu.com/usn/USN-3016-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3016-2
53
reference_url http://www.ubuntu.com/usn/USN-3016-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3016-3
54
reference_url http://www.ubuntu.com/usn/USN-3016-4
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3016-4
55
reference_url http://www.ubuntu.com/usn/USN-3017-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3017-1
56
reference_url http://www.ubuntu.com/usn/USN-3017-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3017-2
57
reference_url http://www.ubuntu.com/usn/USN-3017-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3017-3
58
reference_url http://www.ubuntu.com/usn/USN-3018-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3018-1
59
reference_url http://www.ubuntu.com/usn/USN-3018-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3018-2
60
reference_url http://www.ubuntu.com/usn/USN-3019-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3019-1
61
reference_url http://www.ubuntu.com/usn/USN-3020-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3020-1
62
reference_url http://www.ubuntu.com/usn/USN-3021-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3021-1
63
reference_url http://www.ubuntu.com/usn/USN-3021-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3021-2
64
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1337528
reference_id 1337528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1337528
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:extra:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4913
reference_id CVE-2016-4913
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4913
76
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
77
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
78
reference_url https://usn.ubuntu.com/3016-1/
reference_id USN-3016-1
reference_type
scores
url https://usn.ubuntu.com/3016-1/
79
reference_url https://usn.ubuntu.com/3016-2/
reference_id USN-3016-2
reference_type
scores
url https://usn.ubuntu.com/3016-2/
80
reference_url https://usn.ubuntu.com/3016-3/
reference_id USN-3016-3
reference_type
scores
url https://usn.ubuntu.com/3016-3/
81
reference_url https://usn.ubuntu.com/3016-4/
reference_id USN-3016-4
reference_type
scores
url https://usn.ubuntu.com/3016-4/
82
reference_url https://usn.ubuntu.com/3017-1/
reference_id USN-3017-1
reference_type
scores
url https://usn.ubuntu.com/3017-1/
83
reference_url https://usn.ubuntu.com/3017-2/
reference_id USN-3017-2
reference_type
scores
url https://usn.ubuntu.com/3017-2/
84
reference_url https://usn.ubuntu.com/3017-3/
reference_id USN-3017-3
reference_type
scores
url https://usn.ubuntu.com/3017-3/
85
reference_url https://usn.ubuntu.com/3018-1/
reference_id USN-3018-1
reference_type
scores
url https://usn.ubuntu.com/3018-1/
86
reference_url https://usn.ubuntu.com/3018-2/
reference_id USN-3018-2
reference_type
scores
url https://usn.ubuntu.com/3018-2/
87
reference_url https://usn.ubuntu.com/3019-1/
reference_id USN-3019-1
reference_type
scores
url https://usn.ubuntu.com/3019-1/
88
reference_url https://usn.ubuntu.com/3020-1/
reference_id USN-3020-1
reference_type
scores
url https://usn.ubuntu.com/3020-1/
89
reference_url https://usn.ubuntu.com/3021-1/
reference_id USN-3021-1
reference_type
scores
url https://usn.ubuntu.com/3021-1/
90
reference_url https://usn.ubuntu.com/3021-2/
reference_id USN-3021-2
reference_type
scores
url https://usn.ubuntu.com/3021-2/
fixed_packages
aliases CVE-2016-4913
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kcmx-k8xf-efhs
20
url VCID-kn7p-3uxm-dyeh
vulnerability_id VCID-kn7p-3uxm-dyeh
summary kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18344.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18344
reference_id
reference_type
scores
0
value 0.119
scoring_system epss
scoring_elements 0.93702
published_at 2026-04-01T12:55:00Z
1
value 0.119
scoring_system epss
scoring_elements 0.93712
published_at 2026-04-02T12:55:00Z
2
value 0.119
scoring_system epss
scoring_elements 0.93722
published_at 2026-04-04T12:55:00Z
3
value 0.119
scoring_system epss
scoring_elements 0.93725
published_at 2026-04-07T12:55:00Z
4
value 0.119
scoring_system epss
scoring_elements 0.93734
published_at 2026-04-08T12:55:00Z
5
value 0.119
scoring_system epss
scoring_elements 0.93736
published_at 2026-04-09T12:55:00Z
6
value 0.119
scoring_system epss
scoring_elements 0.9374
published_at 2026-04-13T12:55:00Z
7
value 0.119
scoring_system epss
scoring_elements 0.93762
published_at 2026-04-16T12:55:00Z
8
value 0.12859
scoring_system epss
scoring_elements 0.94066
published_at 2026-04-26T12:55:00Z
9
value 0.12859
scoring_system epss
scoring_elements 0.94065
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610958
reference_id 1610958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610958
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://access.redhat.com/errata/RHSA-2018:3459
reference_id RHSA-2018:3459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3459
9
reference_url https://access.redhat.com/errata/RHSA-2018:3540
reference_id RHSA-2018:3540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3540
10
reference_url https://access.redhat.com/errata/RHSA-2018:3586
reference_id RHSA-2018:3586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3586
11
reference_url https://access.redhat.com/errata/RHSA-2018:3590
reference_id RHSA-2018:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3590
12
reference_url https://access.redhat.com/errata/RHSA-2018:3591
reference_id RHSA-2018:3591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3591
13
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
14
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
fixed_packages
aliases CVE-2017-18344
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kn7p-3uxm-dyeh
21
url VCID-kwt2-vy63-w7cn
vulnerability_id VCID-kwt2-vy63-w7cn
summary kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10879.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10879
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09578
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09592
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09644
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09552
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09626
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09674
published_at 2026-04-09T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09687
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09654
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09638
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09529
published_at 2026-04-16T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09534
published_at 2026-04-18T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09684
published_at 2026-04-21T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09733
published_at 2026-04-24T12:55:00Z
13
value 0.00033
scoring_system epss
scoring_elements 0.09698
published_at 2026-04-26T12:55:00Z
14
value 0.00033
scoring_system epss
scoring_elements 0.09659
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1596806
reference_id 1596806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1596806
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3753-1/
reference_id USN-3753-1
reference_type
scores
url https://usn.ubuntu.com/3753-1/
9
reference_url https://usn.ubuntu.com/3753-2/
reference_id USN-3753-2
reference_type
scores
url https://usn.ubuntu.com/3753-2/
10
reference_url https://usn.ubuntu.com/3871-1/
reference_id USN-3871-1
reference_type
scores
url https://usn.ubuntu.com/3871-1/
11
reference_url https://usn.ubuntu.com/3871-3/
reference_id USN-3871-3
reference_type
scores
url https://usn.ubuntu.com/3871-3/
12
reference_url https://usn.ubuntu.com/3871-4/
reference_id USN-3871-4
reference_type
scores
url https://usn.ubuntu.com/3871-4/
13
reference_url https://usn.ubuntu.com/3871-5/
reference_id USN-3871-5
reference_type
scores
url https://usn.ubuntu.com/3871-5/
fixed_packages
aliases CVE-2018-10879
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwt2-vy63-w7cn
22
url VCID-mrxr-1umt-pugr
vulnerability_id VCID-mrxr-1umt-pugr
summary kernel: Division by zero in change_port_settings in drivers/usb/serial/io_ti.c resulting in a denial of service
references
0
reference_url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b
reference_id
reference_type
scores
url http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18360.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18360.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18360
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23089
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.22934
published_at 2026-04-29T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23119
published_at 2026-04-21T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.22943
published_at 2026-04-24T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.22937
published_at 2026-04-26T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23264
published_at 2026-04-02T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23307
published_at 2026-04-04T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23097
published_at 2026-04-07T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23171
published_at 2026-04-08T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-09T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23243
published_at 2026-04-11T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-12T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.23148
published_at 2026-04-13T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-16T12:55:00Z
14
value 0.00078
scoring_system epss
scoring_elements 0.23156
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18360
3
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1123706
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=1123706
4
reference_url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
reference_id
reference_type
scores
url https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18360
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b
reference_id
reference_type
scores
url https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b
8
reference_url http://www.securityfocus.com/bid/106802
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106802
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1671343
reference_id 1671343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1671343
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-18360
reference_id CVE-2017-18360
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-18360
14
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
15
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
16
reference_url https://usn.ubuntu.com/3933-1/
reference_id USN-3933-1
reference_type
scores
url https://usn.ubuntu.com/3933-1/
17
reference_url https://usn.ubuntu.com/3933-2/
reference_id USN-3933-2
reference_type
scores
url https://usn.ubuntu.com/3933-2/
fixed_packages
aliases CVE-2017-18360
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrxr-1umt-pugr
23
url VCID-nbqn-n5u3-vyd3
vulnerability_id VCID-nbqn-n5u3-vyd3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18232.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-18232
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24802
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24881
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.2492
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24694
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24762
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24808
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24821
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24782
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24724
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2474
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24731
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24709
published_at 2026-04-21T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24649
published_at 2026-04-24T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24638
published_at 2026-04-26T12:55:00Z
14
value 0.00086
scoring_system epss
scoring_elements 0.24594
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-18232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
35
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1558066
reference_id 1558066
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1558066
37
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
38
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
39
reference_url https://usn.ubuntu.com/4163-1/
reference_id USN-4163-1
reference_type
scores
url https://usn.ubuntu.com/4163-1/
40
reference_url https://usn.ubuntu.com/4163-2/
reference_id USN-4163-2
reference_type
scores
url https://usn.ubuntu.com/4163-2/
fixed_packages
aliases CVE-2017-18232
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbqn-n5u3-vyd3
24
url VCID-ncv3-w528-hydu
vulnerability_id VCID-ncv3-w528-hydu
summary kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5848.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5848
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-01T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-29T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35864
published_at 2026-04-21T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35636
published_at 2026-04-24T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35605
published_at 2026-04-26T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.36009
published_at 2026-04-02T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.36039
published_at 2026-04-04T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.3587
published_at 2026-04-07T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.3592
published_at 2026-04-08T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35944
published_at 2026-04-09T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.3595
published_at 2026-04-11T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35911
published_at 2026-04-12T12:55:00Z
12
value 0.00152
scoring_system epss
scoring_elements 0.35886
published_at 2026-04-13T12:55:00Z
13
value 0.00152
scoring_system epss
scoring_elements 0.35926
published_at 2026-04-16T12:55:00Z
14
value 0.00152
scoring_system epss
scoring_elements 0.35914
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
5
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
6
reference_url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
7
reference_url https://source.android.com/security/bulletin/pixel/2018-05-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/pixel/2018-05-01
8
reference_url https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2
reference_id
reference_type
scores
url https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590799
reference_id 1590799
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590799
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5848
reference_id CVE-2018-5848
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5848
17
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
18
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
19
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
fixed_packages
aliases CVE-2018-5848
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ncv3-w528-hydu
25
url VCID-pbkm-v7ye-5uf2
vulnerability_id VCID-pbkm-v7ye-5uf2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8781.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-8781
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.27921
published_at 2026-04-01T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27518
published_at 2026-04-29T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.2776
published_at 2026-04-21T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27703
published_at 2026-04-24T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27593
published_at 2026-04-26T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27977
published_at 2026-04-02T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.28018
published_at 2026-04-04T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.2781
published_at 2026-04-07T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27877
published_at 2026-04-12T12:55:00Z
9
value 0.00101
scoring_system epss
scoring_elements 0.27918
published_at 2026-04-09T12:55:00Z
10
value 0.00101
scoring_system epss
scoring_elements 0.27919
published_at 2026-04-11T12:55:00Z
11
value 0.00101
scoring_system epss
scoring_elements 0.27818
published_at 2026-04-13T12:55:00Z
12
value 0.00101
scoring_system epss
scoring_elements 0.27826
published_at 2026-04-16T12:55:00Z
13
value 0.00101
scoring_system epss
scoring_elements 0.27803
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-8781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
48
reference_url https://patchwork.freedesktop.org/patch/211845/
reference_id
reference_type
scores
url https://patchwork.freedesktop.org/patch/211845/
49
reference_url https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
reference_id
reference_type
scores
url https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
50
reference_url https://www.debian.org/security/2018/dsa-4187
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4187
51
reference_url https://www.debian.org/security/2018/dsa-4188
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4188
52
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1571062
reference_id 1571062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1571062
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-8781
reference_id CVE-2018-8781
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-8781
65
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
66
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
67
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
68
reference_url https://usn.ubuntu.com/3654-1/
reference_id USN-3654-1
reference_type
scores
url https://usn.ubuntu.com/3654-1/
69
reference_url https://usn.ubuntu.com/3654-2/
reference_id USN-3654-2
reference_type
scores
url https://usn.ubuntu.com/3654-2/
70
reference_url https://usn.ubuntu.com/3656-1/
reference_id USN-3656-1
reference_type
scores
url https://usn.ubuntu.com/3656-1/
71
reference_url https://usn.ubuntu.com/3674-1/
reference_id USN-3674-1
reference_type
scores
url https://usn.ubuntu.com/3674-1/
72
reference_url https://usn.ubuntu.com/3674-2/
reference_id USN-3674-2
reference_type
scores
url https://usn.ubuntu.com/3674-2/
73
reference_url https://usn.ubuntu.com/3677-1/
reference_id USN-3677-1
reference_type
scores
url https://usn.ubuntu.com/3677-1/
74
reference_url https://usn.ubuntu.com/3677-2/
reference_id USN-3677-2
reference_type
scores
url https://usn.ubuntu.com/3677-2/
fixed_packages
aliases CVE-2018-8781
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbkm-v7ye-5uf2
26
url VCID-q4ce-wgv2-ryhu
vulnerability_id VCID-q4ce-wgv2-ryhu
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5391.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5391.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5391
reference_id
reference_type
scores
0
value 0.03822
scoring_system epss
scoring_elements 0.88077
published_at 2026-04-01T12:55:00Z
1
value 0.03822
scoring_system epss
scoring_elements 0.88126
published_at 2026-04-08T12:55:00Z
2
value 0.03822
scoring_system epss
scoring_elements 0.88085
published_at 2026-04-02T12:55:00Z
3
value 0.03822
scoring_system epss
scoring_elements 0.88101
published_at 2026-04-04T12:55:00Z
4
value 0.03822
scoring_system epss
scoring_elements 0.88107
published_at 2026-04-07T12:55:00Z
5
value 0.03822
scoring_system epss
scoring_elements 0.88132
published_at 2026-04-09T12:55:00Z
6
value 0.03822
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-11T12:55:00Z
7
value 0.03826
scoring_system epss
scoring_elements 0.88155
published_at 2026-04-16T12:55:00Z
8
value 0.03826
scoring_system epss
scoring_elements 0.8817
published_at 2026-04-24T12:55:00Z
9
value 0.03826
scoring_system epss
scoring_elements 0.88175
published_at 2026-04-26T12:55:00Z
10
value 0.03826
scoring_system epss
scoring_elements 0.88174
published_at 2026-04-29T12:55:00Z
11
value 0.03826
scoring_system epss
scoring_elements 0.8814
published_at 2026-04-12T12:55:00Z
12
value 0.03826
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-13T12:55:00Z
13
value 0.03826
scoring_system epss
scoring_elements 0.88152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5391
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609664
reference_id 1609664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609664
5
reference_url https://security.archlinux.org/AVG-760
reference_id AVG-760
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-760
6
reference_url https://security.archlinux.org/AVG-761
reference_id AVG-761
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-761
7
reference_url https://security.archlinux.org/AVG-762
reference_id AVG-762
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-762
8
reference_url https://security.archlinux.org/AVG-767
reference_id AVG-767
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-767
9
reference_url https://access.redhat.com/errata/RHSA-2018:2785
reference_id RHSA-2018:2785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2785
10
reference_url https://access.redhat.com/errata/RHSA-2018:2791
reference_id RHSA-2018:2791
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2791
11
reference_url https://access.redhat.com/errata/RHSA-2018:2846
reference_id RHSA-2018:2846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2846
12
reference_url https://access.redhat.com/errata/RHSA-2018:2924
reference_id RHSA-2018:2924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2924
13
reference_url https://access.redhat.com/errata/RHSA-2018:2925
reference_id RHSA-2018:2925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2925
14
reference_url https://access.redhat.com/errata/RHSA-2018:2933
reference_id RHSA-2018:2933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2933
15
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
16
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
17
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
18
reference_url https://access.redhat.com/errata/RHSA-2018:3459
reference_id RHSA-2018:3459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3459
19
reference_url https://access.redhat.com/errata/RHSA-2018:3540
reference_id RHSA-2018:3540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3540
20
reference_url https://access.redhat.com/errata/RHSA-2018:3586
reference_id RHSA-2018:3586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3586
21
reference_url https://access.redhat.com/errata/RHSA-2018:3590
reference_id RHSA-2018:3590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3590
22
reference_url https://usn.ubuntu.com/3740-1/
reference_id USN-3740-1
reference_type
scores
url https://usn.ubuntu.com/3740-1/
23
reference_url https://usn.ubuntu.com/3740-2/
reference_id USN-3740-2
reference_type
scores
url https://usn.ubuntu.com/3740-2/
24
reference_url https://usn.ubuntu.com/3741-1/
reference_id USN-3741-1
reference_type
scores
url https://usn.ubuntu.com/3741-1/
25
reference_url https://usn.ubuntu.com/3741-2/
reference_id USN-3741-2
reference_type
scores
url https://usn.ubuntu.com/3741-2/
26
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
27
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
fixed_packages
aliases CVE-2018-5391
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4ce-wgv2-ryhu
27
url VCID-qd2m-y4xv-nqga
vulnerability_id VCID-qd2m-y4xv-nqga
summary kernel: NULL pointer dereference in ext4/xattr.c:ext4_xattr_inode_hash() causes crash with crafted ext4 image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1094.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1094.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1094
reference_id
reference_type
scores
0
value 0.00285
scoring_system epss
scoring_elements 0.51798
published_at 2026-04-01T12:55:00Z
1
value 0.00285
scoring_system epss
scoring_elements 0.51847
published_at 2026-04-02T12:55:00Z
2
value 0.00285
scoring_system epss
scoring_elements 0.51873
published_at 2026-04-04T12:55:00Z
3
value 0.00285
scoring_system epss
scoring_elements 0.51837
published_at 2026-04-07T12:55:00Z
4
value 0.00285
scoring_system epss
scoring_elements 0.51892
published_at 2026-04-08T12:55:00Z
5
value 0.00285
scoring_system epss
scoring_elements 0.5189
published_at 2026-04-26T12:55:00Z
6
value 0.00285
scoring_system epss
scoring_elements 0.51943
published_at 2026-04-11T12:55:00Z
7
value 0.00285
scoring_system epss
scoring_elements 0.51925
published_at 2026-04-12T12:55:00Z
8
value 0.00285
scoring_system epss
scoring_elements 0.51909
published_at 2026-04-13T12:55:00Z
9
value 0.00285
scoring_system epss
scoring_elements 0.51952
published_at 2026-04-16T12:55:00Z
10
value 0.00285
scoring_system epss
scoring_elements 0.51958
published_at 2026-04-18T12:55:00Z
11
value 0.00285
scoring_system epss
scoring_elements 0.51938
published_at 2026-04-21T12:55:00Z
12
value 0.00285
scoring_system epss
scoring_elements 0.51885
published_at 2026-04-24T12:55:00Z
13
value 0.00285
scoring_system epss
scoring_elements 0.5185
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1094
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560788
reference_id 1560788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560788
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3695-1/
reference_id USN-3695-1
reference_type
scores
url https://usn.ubuntu.com/3695-1/
9
reference_url https://usn.ubuntu.com/3695-2/
reference_id USN-3695-2
reference_type
scores
url https://usn.ubuntu.com/3695-2/
fixed_packages
aliases CVE-2018-1094
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qd2m-y4xv-nqga
28
url VCID-ttjy-1g7c-73a6
vulnerability_id VCID-ttjy-1g7c-73a6
summary kernel: filesystem corruption due to an unchecked error condition during an xfs attribute change
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18690.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18690
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18295
published_at 2026-04-01T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18447
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18502
published_at 2026-04-04T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18211
published_at 2026-04-07T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18294
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18347
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18348
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.183
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18249
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18194
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18207
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-21T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18144
published_at 2026-04-24T12:55:00Z
13
value 0.00058
scoring_system epss
scoring_elements 0.18127
published_at 2026-04-26T12:55:00Z
14
value 0.00058
scoring_system epss
scoring_elements 0.1809
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18690
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18690
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1643988
reference_id 1643988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1643988
5
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
6
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
7
reference_url https://usn.ubuntu.com/3847-1/
reference_id USN-3847-1
reference_type
scores
url https://usn.ubuntu.com/3847-1/
8
reference_url https://usn.ubuntu.com/3847-2/
reference_id USN-3847-2
reference_type
scores
url https://usn.ubuntu.com/3847-2/
9
reference_url https://usn.ubuntu.com/3847-3/
reference_id USN-3847-3
reference_type
scores
url https://usn.ubuntu.com/3847-3/
10
reference_url https://usn.ubuntu.com/3848-1/
reference_id USN-3848-1
reference_type
scores
url https://usn.ubuntu.com/3848-1/
11
reference_url https://usn.ubuntu.com/3848-2/
reference_id USN-3848-2
reference_type
scores
url https://usn.ubuntu.com/3848-2/
12
reference_url https://usn.ubuntu.com/3849-1/
reference_id USN-3849-1
reference_type
scores
url https://usn.ubuntu.com/3849-1/
13
reference_url https://usn.ubuntu.com/3849-2/
reference_id USN-3849-2
reference_type
scores
url https://usn.ubuntu.com/3849-2/
fixed_packages
aliases CVE-2018-18690
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ttjy-1g7c-73a6
29
url VCID-vjfv-v9np-vkek
vulnerability_id VCID-vjfv-v9np-vkek
summary
Multiple vulnerabilities have been found in procps, the worst of
    which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1120.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1120.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1120
reference_id
reference_type
scores
0
value 0.01335
scoring_system epss
scoring_elements 0.79931
published_at 2026-04-01T12:55:00Z
1
value 0.01335
scoring_system epss
scoring_elements 0.79947
published_at 2026-04-07T12:55:00Z
2
value 0.01335
scoring_system epss
scoring_elements 0.79938
published_at 2026-04-02T12:55:00Z
3
value 0.01335
scoring_system epss
scoring_elements 0.79959
published_at 2026-04-04T12:55:00Z
4
value 0.01335
scoring_system epss
scoring_elements 0.79976
published_at 2026-04-08T12:55:00Z
5
value 0.01335
scoring_system epss
scoring_elements 0.79985
published_at 2026-04-09T12:55:00Z
6
value 0.01335
scoring_system epss
scoring_elements 0.80005
published_at 2026-04-11T12:55:00Z
7
value 0.01335
scoring_system epss
scoring_elements 0.79989
published_at 2026-04-12T12:55:00Z
8
value 0.01335
scoring_system epss
scoring_elements 0.79981
published_at 2026-04-13T12:55:00Z
9
value 0.01335
scoring_system epss
scoring_elements 0.80009
published_at 2026-04-16T12:55:00Z
10
value 0.0144
scoring_system epss
scoring_elements 0.80785
published_at 2026-04-26T12:55:00Z
11
value 0.0144
scoring_system epss
scoring_elements 0.80798
published_at 2026-04-29T12:55:00Z
12
value 0.0144
scoring_system epss
scoring_elements 0.80756
published_at 2026-04-18T12:55:00Z
13
value 0.0144
scoring_system epss
scoring_elements 0.80758
published_at 2026-04-21T12:55:00Z
14
value 0.0144
scoring_system epss
scoring_elements 0.80781
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1120
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120
4
reference_url http://seclists.org/oss-sec/2018/q2/122
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2018/q2/122
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
reference_id
reference_type
scores
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
7
reference_url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
8
reference_url https://www.exploit-db.com/exploits/44806/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/44806/
9
reference_url http://www.securityfocus.com/bid/104229
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104229
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575472
reference_id 1575472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575472
11
reference_url https://security.archlinux.org/AVG-701
reference_id AVG-701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-701
12
reference_url https://security.archlinux.org/AVG-702
reference_id AVG-702
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-702
13
reference_url https://security.archlinux.org/AVG-703
reference_id AVG-703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-703
14
reference_url https://security.archlinux.org/AVG-704
reference_id AVG-704
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-704
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1120
reference_id CVE-2018-1120
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
2
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1120
24
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44806.txt
reference_id CVE-2018-1124;CVE-2018-1123;CVE-2018-1122;CVE-2018-1121;CVE-2018-1120
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44806.txt
25
reference_url https://security.gentoo.org/glsa/201805-14
reference_id GLSA-201805-14
reference_type
scores
url https://security.gentoo.org/glsa/201805-14
26
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
27
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
28
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
29
reference_url https://access.redhat.com/errata/RHSA-2020:3804
reference_id RHSA-2020:3804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3804
30
reference_url https://access.redhat.com/errata/RHSA-2020:3810
reference_id RHSA-2020:3810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3810
31
reference_url https://usn.ubuntu.com/3752-1/
reference_id USN-3752-1
reference_type
scores
url https://usn.ubuntu.com/3752-1/
32
reference_url https://usn.ubuntu.com/3752-2/
reference_id USN-3752-2
reference_type
scores
url https://usn.ubuntu.com/3752-2/
33
reference_url https://usn.ubuntu.com/3752-3/
reference_id USN-3752-3
reference_type
scores
url https://usn.ubuntu.com/3752-3/
34
reference_url https://usn.ubuntu.com/3910-1/
reference_id USN-3910-1
reference_type
scores
url https://usn.ubuntu.com/3910-1/
35
reference_url https://usn.ubuntu.com/3910-2/
reference_id USN-3910-2
reference_type
scores
url https://usn.ubuntu.com/3910-2/
fixed_packages
aliases CVE-2018-1120
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vjfv-v9np-vkek
30
url VCID-wdsb-7y8b-ryb2
vulnerability_id VCID-wdsb-7y8b-ryb2
summary kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5344.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5344.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5344
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20016
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20164
published_at 2026-04-02T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20223
published_at 2026-04-04T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19949
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20029
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20088
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20105
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20059
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20001
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19982
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19986
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19981
published_at 2026-04-21T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19872
published_at 2026-04-24T12:55:00Z
13
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-26T12:55:00Z
14
value 0.00064
scoring_system epss
scoring_elements 0.19836
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5344
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1533909
reference_id 1533909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1533909
5
reference_url https://access.redhat.com/errata/RHSA-2018:2948
reference_id RHSA-2018:2948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2948
6
reference_url https://access.redhat.com/errata/RHSA-2018:3083
reference_id RHSA-2018:3083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3083
7
reference_url https://access.redhat.com/errata/RHSA-2018:3096
reference_id RHSA-2018:3096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3096
8
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
9
reference_url https://usn.ubuntu.com/3583-2/
reference_id USN-3583-2
reference_type
scores
url https://usn.ubuntu.com/3583-2/
10
reference_url https://usn.ubuntu.com/3617-1/
reference_id USN-3617-1
reference_type
scores
url https://usn.ubuntu.com/3617-1/
11
reference_url https://usn.ubuntu.com/3617-2/
reference_id USN-3617-2
reference_type
scores
url https://usn.ubuntu.com/3617-2/
12
reference_url https://usn.ubuntu.com/3617-3/
reference_id USN-3617-3
reference_type
scores
url https://usn.ubuntu.com/3617-3/
13
reference_url https://usn.ubuntu.com/3619-1/
reference_id USN-3619-1
reference_type
scores
url https://usn.ubuntu.com/3619-1/
14
reference_url https://usn.ubuntu.com/3619-2/
reference_id USN-3619-2
reference_type
scores
url https://usn.ubuntu.com/3619-2/
15
reference_url https://usn.ubuntu.com/3632-1/
reference_id USN-3632-1
reference_type
scores
url https://usn.ubuntu.com/3632-1/
fixed_packages
aliases CVE-2018-5344
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdsb-7y8b-ryb2
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-957%3Farch=el7