{"url":"http://public2.vulnerablecode.io/api/packages/109970?format=json","purl":"pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.10-1jpp.1?arch=el7","type":"rpm","namespace":"redhat","name":"java-1.8.0-ibm","version":"1:1.8.0.5.10-1jpp.1","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43643?format=json","vulnerability_id":"VCID-2jc9-6xf6-63a6","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2641.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2641","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38108","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38127","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38105","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38141","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37992","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.41992","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102605","reference_id":"102605","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"http://www.securityfocus.com/bid/102605"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534766","reference_id":"1534766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534766"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:30Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2641"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jc9-6xf6-63a6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43632?format=json","vulnerability_id":"VCID-4zte-62md-kyd8","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2599.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2599","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23397","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23025","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23223","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23244","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2325","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23292","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2318","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29072","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102633","reference_id":"102633","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"http://www.securityfocus.com/bid/102633"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534543","reference_id":"1534543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534543"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:37Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2599"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zte-62md-kyd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76694?format=json","vulnerability_id":"VCID-6aph-ab51-2qbt","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2677.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2677","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21318","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21127","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29913","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102656","reference_id":"102656","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"http://www.securityfocus.com/bid/102656"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534288","reference_id":"1534288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534288"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:54Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2677"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6aph-ab51-2qbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43631?format=json","vulnerability_id":"VCID-6xzp-k5m9-ykbc","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2588.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2588.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2588","reference_id":"","reference_type":"","scores":[{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57055","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57216","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57204","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57197","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59503","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.5951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59526","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00583","scoring_system":"epss","scoring_elements":"0.69078","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102661","reference_id":"102661","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"http://www.securityfocus.com/bid/102661"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534299","reference_id":"1534299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534299"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:04Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2588"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6xzp-k5m9-ykbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83658?format=json","vulnerability_id":"VCID-84ub-skmg-cyhc","summary":"JDK: J9 JVM allows untrusted code running under a security manager to elevate its privileges","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1417","reference_id":"","reference_type":"","scores":[{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80512","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.8054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80532","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80561","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80571","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80567","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01417","scoring_system":"epss","scoring_elements":"0.80645","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1568966","reference_id":"1568966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1568966"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1463"}],"fixed_packages":[],"aliases":["CVE-2018-1417"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-84ub-skmg-cyhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43633?format=json","vulnerability_id":"VCID-8f22-4b8p-m3aa","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2602.json","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2602","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20193","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20055","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20703","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20822","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25063","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102642","reference_id":"102642","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"http://www.securityfocus.com/bid/102642"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534525","reference_id":"1534525","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534525"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:56Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2602"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8f22-4b8p-m3aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43642?format=json","vulnerability_id":"VCID-8x6f-shrr-sqaj","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2639.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2639","reference_id":"","reference_type":"","scores":[{"value":"0.00574","scoring_system":"epss","scoring_elements":"0.68826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69273","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69303","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69327","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2639"},{"reference_url":"http://www.securityfocus.com/bid/102556","reference_id":"102556","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"http://www.securityfocus.com/bid/102556"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535351","reference_id":"1535351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535351"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"}],"fixed_packages":[],"aliases":["CVE-2018-2639"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x6f-shrr-sqaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43629?format=json","vulnerability_id":"VCID-azey-nwkx-ukat","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2582.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2582","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44643","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44739","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44732","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44583","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44685","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44696","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102597","reference_id":"102597","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"http://www.securityfocus.com/bid/102597"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534768","reference_id":"1534768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534768"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:42Z/"}],"url":"https://usn.ubuntu.com/3613-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2582"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azey-nwkx-ukat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43641?format=json","vulnerability_id":"VCID-c1mn-fexd-p3dk","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2638","reference_id":"","reference_type":"","scores":[{"value":"0.00721","scoring_system":"epss","scoring_elements":"0.72567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73174","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73188","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73051","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73071","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73083","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2638"},{"reference_url":"http://www.securityfocus.com/bid/102546","reference_id":"102546","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"http://www.securityfocus.com/bid/102546"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535350","reference_id":"1535350","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535350"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:42Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"}],"fixed_packages":[],"aliases":["CVE-2018-2638"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c1mn-fexd-p3dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43638?format=json","vulnerability_id":"VCID-db1c-8scn-buet","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2633.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2633","reference_id":"","reference_type":"","scores":[{"value":"0.00643","scoring_system":"epss","scoring_elements":"0.70717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71818","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71893","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.7453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74568","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74567","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74603","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0083","scoring_system":"epss","scoring_elements":"0.74609","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102557","reference_id":"102557","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"http://www.securityfocus.com/bid/102557"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535036","reference_id":"1535036","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535036"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:49Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2633"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-db1c-8scn-buet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43645?format=json","vulnerability_id":"VCID-htzk-vgn5-m7ak","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2663.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2663.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2663","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21318","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21127","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102662","reference_id":"102662","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"http://www.securityfocus.com/bid/102662"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534296","reference_id":"1534296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534296"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:53Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2663"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-htzk-vgn5-m7ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43627?format=json","vulnerability_id":"VCID-kw91-zqtv-7kap","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2579.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2579.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2579","reference_id":"","reference_type":"","scores":[{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29163","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28835","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.28949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29068","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.2914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00109","scoring_system":"epss","scoring_elements":"0.29288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3636","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102663","reference_id":"102663","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"http://www.securityfocus.com/bid/102663"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534298","reference_id":"1534298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534298"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:41Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2579"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kw91-zqtv-7kap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76696?format=json","vulnerability_id":"VCID-r4tw-jgd7-euet","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2678.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2678.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2678","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21318","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21127","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21166","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29017","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2678"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102659","reference_id":"102659","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"http://www.securityfocus.com/bid/102659"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534263","reference_id":"1534263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534263"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:24:12Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2678"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4tw-jgd7-euet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43639?format=json","vulnerability_id":"VCID-uc2v-fweb-cfew","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2634.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2634","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32838","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32873","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32854","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32914","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32884","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32851","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41124","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102592","reference_id":"102592","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"http://www.securityfocus.com/bid/102592"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534943","reference_id":"1534943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534943"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:51Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2634"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uc2v-fweb-cfew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43634?format=json","vulnerability_id":"VCID-w83z-5wt6-j3fz","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2603.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2603","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26402","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26432","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27833","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27876","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27828","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36592","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102625","reference_id":"102625","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"http://www.securityfocus.com/bid/102625"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534553","reference_id":"1534553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534553"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:12:36Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2603"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w83z-5wt6-j3fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43640?format=json","vulnerability_id":"VCID-xqrm-1bu9-abfe","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2637.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2637","reference_id":"","reference_type":"","scores":[{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41058","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41132","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.4116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41117","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41134","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41139","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.41164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45459","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102576","reference_id":"102576","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"http://www.securityfocus.com/bid/102576"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534970","reference_id":"1534970","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534970"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:43Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2637"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqrm-1bu9-abfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43635?format=json","vulnerability_id":"VCID-y34y-ewv6-fkhb","summary":"Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2618.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2618","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33141","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32824","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33047","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32979","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41275","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102612","reference_id":"102612","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"http://www.securityfocus.com/bid/102612"},{"reference_url":"http://www.securitytracker.com/id/1040203","reference_id":"1040203","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"http://www.securitytracker.com/id/1040203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534762","reference_id":"1534762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1534762"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbst03911en_us","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us"},{"reference_url":"https://www.debian.org/security/2018/dsa-4144","reference_id":"dsa-4144","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://www.debian.org/security/2018/dsa-4144"},{"reference_url":"https://www.debian.org/security/2018/dsa-4166","reference_id":"dsa-4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://www.debian.org/security/2018/dsa-4166"},{"reference_url":"https://security.gentoo.org/glsa/201803-06","reference_id":"GLSA-201803-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-06"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0001/","reference_id":"ntap-20180117-0001","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180117-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0095","reference_id":"RHSA-2018:0095","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0099","reference_id":"RHSA-2018:0099","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0100","reference_id":"RHSA-2018:0100","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0100"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0115","reference_id":"RHSA-2018:0115","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0115"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0349","reference_id":"RHSA-2018:0349","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0351","reference_id":"RHSA-2018:0351","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0352","reference_id":"RHSA-2018:0352","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0458","reference_id":"RHSA-2018:0458","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0521","reference_id":"RHSA-2018:0521","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1463","reference_id":"RHSA-2018:1463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1812","reference_id":"RHSA-2018:1812","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:1812"},{"reference_url":"https://usn.ubuntu.com/3613-1/","reference_id":"USN-3613-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://usn.ubuntu.com/3613-1/"},{"reference_url":"https://usn.ubuntu.com/3614-1/","reference_id":"USN-3614-1","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:23:12Z/"}],"url":"https://usn.ubuntu.com/3614-1/"}],"fixed_packages":[],"aliases":["CVE-2018-2618"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y34y-ewv6-fkhb"}],"fixing_vulnerabilities":[],"risk_score":"3.8","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-ibm@1:1.8.0.5.10-1jpp.1%3Farch=el7"}