{"url":"http://public2.vulnerablecode.io/api/packages/372680?format=json","purl":"pkg:alpm/archlinux/linux-lts@4.14.63-1","type":"alpm","namespace":"archlinux","name":"linux-lts","version":"4.14.63-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.14.71-1","latest_non_vulnerable_version":"6.2-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=json","vulnerability_id":"VCID-6jsn-7538-a7ha","summary":"L1 Terminal Fault speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3646","reference_id":"","reference_type":"","scores":[{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88182","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.8829","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.8819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88427","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005","reference_id":"1585005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2384","reference_id":"RHSA-2018:2384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2388","reference_id":"RHSA-2018:2388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2389","reference_id":"RHSA-2018:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2391","reference_id":"RHSA-2018:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2392","reference_id":"RHSA-2018:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2393","reference_id":"RHSA-2018:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2395","reference_id":"RHSA-2018:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2402","reference_id":"RHSA-2018:2402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2403","reference_id":"RHSA-2018:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2404","reference_id":"RHSA-2018:2404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2602","reference_id":"RHSA-2018:2602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2603","reference_id":"RHSA-2018:2603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2603"},{"reference_url":"https://usn.ubuntu.com/3740-1/","reference_id":"USN-3740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-1/"},{"reference_url":"https://usn.ubuntu.com/3740-2/","reference_id":"USN-3740-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-2/"},{"reference_url":"https://usn.ubuntu.com/3741-1/","reference_id":"USN-3741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-1/"},{"reference_url":"https://usn.ubuntu.com/3741-2/","reference_id":"USN-3741-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-2/"},{"reference_url":"https://usn.ubuntu.com/3742-1/","reference_id":"USN-3742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-1/"},{"reference_url":"https://usn.ubuntu.com/3742-2/","reference_id":"USN-3742-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-2/"},{"reference_url":"https://usn.ubuntu.com/3756-1/","reference_id":"USN-3756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3756-1/"},{"reference_url":"https://usn.ubuntu.com/3823-1/","reference_id":"USN-3823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3823-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-273.html","reference_id":"XSA-273","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-273.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/372680?format=json","purl":"pkg:alpm/archlinux/linux-lts@4.14.63-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.14.63-1"}],"aliases":["CVE-2018-3646","XSA-273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4159?format=json","vulnerability_id":"VCID-7vn6-5h93-27hn","summary":"L1 Terminal Fault speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3620","reference_id":"","reference_type":"","scores":[{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.8467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0232","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.8667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86679","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005","reference_id":"1585005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2384","reference_id":"RHSA-2018:2384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2388","reference_id":"RHSA-2018:2388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2389","reference_id":"RHSA-2018:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2391","reference_id":"RHSA-2018:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2392","reference_id":"RHSA-2018:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2393","reference_id":"RHSA-2018:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2395","reference_id":"RHSA-2018:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2402","reference_id":"RHSA-2018:2402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2403","reference_id":"RHSA-2018:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2404","reference_id":"RHSA-2018:2404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2602","reference_id":"RHSA-2018:2602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2603","reference_id":"RHSA-2018:2603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2603"},{"reference_url":"https://usn.ubuntu.com/3740-1/","reference_id":"USN-3740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-1/"},{"reference_url":"https://usn.ubuntu.com/3740-2/","reference_id":"USN-3740-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-2/"},{"reference_url":"https://usn.ubuntu.com/3741-1/","reference_id":"USN-3741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-1/"},{"reference_url":"https://usn.ubuntu.com/3741-2/","reference_id":"USN-3741-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-2/"},{"reference_url":"https://usn.ubuntu.com/3742-1/","reference_id":"USN-3742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-1/"},{"reference_url":"https://usn.ubuntu.com/3742-2/","reference_id":"USN-3742-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-2/"},{"reference_url":"https://usn.ubuntu.com/3823-1/","reference_id":"USN-3823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3823-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-273.html","reference_id":"XSA-273","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-273.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/372680?format=json","purl":"pkg:alpm/archlinux/linux-lts@4.14.63-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.14.63-1"}],"aliases":["CVE-2018-3620"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90664?format=json","vulnerability_id":"VCID-yzkk-a8az-hff5","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3615.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3615","reference_id":"","reference_type":"","scores":[{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.8023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80211","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80186","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.8021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01545","scoring_system":"epss","scoring_elements":"0.81329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01545","scoring_system":"epss","scoring_elements":"0.81338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01714","scoring_system":"epss","scoring_elements":"0.82395","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01714","scoring_system":"epss","scoring_elements":"0.82428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01714","scoring_system":"epss","scoring_elements":"0.82418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82706","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82688","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3615"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/372680?format=json","purl":"pkg:alpm/archlinux/linux-lts@4.14.63-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.14.63-1"}],"aliases":["CVE-2018-3615"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yzkk-a8az-hff5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@4.14.63-1"}