{"url":"http://public2.vulnerablecode.io/api/packages/371413?format=json","purl":"pkg:alpm/archlinux/systemd@239.300-1","type":"alpm","namespace":"archlinux","name":"systemd","version":"239.300-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"240.34-1","latest_non_vulnerable_version":"249.1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60275?format=json","vulnerability_id":"VCID-1mej-gstk-pfbs","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15686.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15686.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15686","reference_id":"","reference_type":"","scores":[{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.8129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81432","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81412","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81391","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81383","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81359","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81329","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81268","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81259","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01533","scoring_system":"epss","scoring_elements":"0.81289","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/pull/10519","reference_id":"10519","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://github.com/systemd/systemd/pull/10519"},{"reference_url":"http://www.securityfocus.com/bid/105747","reference_id":"105747","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"http://www.securityfocus.com/bid/105747"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639071","reference_id":"1639071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639071"},{"reference_url":"https://www.exploit-db.com/exploits/45714/","reference_id":"45714","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://www.exploit-db.com/exploits/45714/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912005","reference_id":"912005","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912005"},{"reference_url":"https://security.archlinux.org/ASA-201811-11","reference_id":"ASA-201811-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-11"},{"reference_url":"https://security.archlinux.org/AVG-789","reference_id":"AVG-789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-789"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1687","reference_id":"CVE-2018-15686","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1687"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45714.c","reference_id":"CVE-2018-15686","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/45714.c"},{"reference_url":"https://security.gentoo.org/glsa/201810-10","reference_id":"GLSA-201810-10","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://security.gentoo.org/glsa/201810-10"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2091","reference_id":"RHSA-2019:2091","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3222","reference_id":"RHSA-2019:3222","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0593","reference_id":"RHSA-2020:0593","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0593"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1264","reference_id":"RHSA-2020:1264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1264"},{"reference_url":"https://usn.ubuntu.com/3816-1/","reference_id":"USN-3816-1","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:50:23Z/"}],"url":"https://usn.ubuntu.com/3816-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371413?format=json","purl":"pkg:alpm/archlinux/systemd@239.300-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@239.300-1"}],"aliases":["CVE-2018-15686"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1mej-gstk-pfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60276?format=json","vulnerability_id":"VCID-cmbj-869t-c3e3","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15687.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15687.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15687","reference_id":"","reference_type":"","scores":[{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.55955","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56065","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56121","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.5613","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59436","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5945","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59424","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59388","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/105748","reference_id":"105748","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"http://www.securityfocus.com/bid/105748"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639076","reference_id":"1639076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639076"},{"reference_url":"https://www.exploit-db.com/exploits/45715/","reference_id":"45715","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://www.exploit-db.com/exploits/45715/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912007","reference_id":"912007","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912007"},{"reference_url":"https://security.archlinux.org/ASA-201811-11","reference_id":"ASA-201811-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-11"},{"reference_url":"https://security.archlinux.org/AVG-789","reference_id":"AVG-789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-789"},{"reference_url":"https://github.com/systemd/systemd/pull/10517/commits","reference_id":"commits","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://github.com/systemd/systemd/pull/10517/commits"},{"reference_url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1689","reference_id":"CVE-2018-15687","reference_type":"exploit","scores":[],"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1689"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45715.txt","reference_id":"CVE-2018-15687","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45715.txt"},{"reference_url":"https://security.gentoo.org/glsa/201810-10","reference_id":"GLSA-201810-10","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://security.gentoo.org/glsa/201810-10"},{"reference_url":"https://usn.ubuntu.com/3816-1/","reference_id":"USN-3816-1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:48:02Z/"}],"url":"https://usn.ubuntu.com/3816-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371413?format=json","purl":"pkg:alpm/archlinux/systemd@239.300-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@239.300-1"}],"aliases":["CVE-2018-15687"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cmbj-869t-c3e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60277?format=json","vulnerability_id":"VCID-q4kr-rg2c-f7ad","summary":"Multiple vulnerabilities have been found in systemd, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15688.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15688.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15688","reference_id":"","reference_type":"","scores":[{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72718","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72584","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72598","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.7261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72616","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.727","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00727","scoring_system":"epss","scoring_elements":"0.72688","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/systemd/systemd/pull/10518","reference_id":"10518","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://github.com/systemd/systemd/pull/10518"},{"reference_url":"http://www.securityfocus.com/bid/105745","reference_id":"105745","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"http://www.securityfocus.com/bid/105745"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639067","reference_id":"1639067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1639067"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912008","reference_id":"912008","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912008"},{"reference_url":"https://security.archlinux.org/ASA-201811-11","reference_id":"ASA-201811-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-11"},{"reference_url":"https://security.archlinux.org/AVG-789","reference_id":"AVG-789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-789"},{"reference_url":"https://security.gentoo.org/glsa/201810-10","reference_id":"GLSA-201810-10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://security.gentoo.org/glsa/201810-10"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3665","reference_id":"RHSA-2018:3665","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0049","reference_id":"RHSA-2019:0049","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:0049"},{"reference_url":"https://usn.ubuntu.com/3806-1/","reference_id":"USN-3806-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://usn.ubuntu.com/3806-1/"},{"reference_url":"https://usn.ubuntu.com/3807-1/","reference_id":"USN-3807-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:55:22Z/"}],"url":"https://usn.ubuntu.com/3807-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371413?format=json","purl":"pkg:alpm/archlinux/systemd@239.300-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@239.300-1"}],"aliases":["CVE-2018-15688"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q4kr-rg2c-f7ad"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/systemd@239.300-1"}