Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-8e6e-wygx-ryb1
Vulnerability ID VCID-8e6e-wygx-ryb1
Aliases CVE-2018-16658
Summary security update
Status Published
Exploitability 0.5
Weighted Severity 3.6
Risk 1.8
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16658.json
https://api.first.org/data/v1/epss?cve=CVE-2018-16658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1627731 https://bugzilla.redhat.com/show_bug.cgi?id=1627731
RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2029
RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:2043
RHSA-2019:4154 https://access.redhat.com/errata/RHSA-2019:4154
USN-3797-1 https://usn.ubuntu.com/3797-1/
USN-3797-2 https://usn.ubuntu.com/3797-2/
USN-3820-1 https://usn.ubuntu.com/3820-1/
USN-3820-2 https://usn.ubuntu.com/3820-2/
USN-3820-3 https://usn.ubuntu.com/3820-3/
USN-3822-1 https://usn.ubuntu.com/3822-1/
USN-3822-2 https://usn.ubuntu.com/3822-2/
No exploits are available.
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16658.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.02905
EPSS Score 0.00015
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:44:38.298250+00:00 Debian Oval Importer Import https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.0.0