Search for vulnerabilities
Vulnerability details: VCID-ywq5-t9hj-aaaf
Vulnerability ID VCID-ywq5-t9hj-aaaf
Aliases CVE-2018-1000180
GHSA-xqj7-j8j5-f2xr
Summary Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000180.html
rhas Important https://access.redhat.com/errata/RHSA-2018:2423
rhas Important https://access.redhat.com/errata/RHSA-2018:2424
rhas Important https://access.redhat.com/errata/RHSA-2018:2425
rhas Important https://access.redhat.com/errata/RHSA-2018:2428
rhas Important https://access.redhat.com/errata/RHSA-2018:2643
rhas Important https://access.redhat.com/errata/RHSA-2018:2669
rhas Important https://access.redhat.com/errata/RHSA-2019:0877
cvssv3 4.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000180.json
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00221 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00426 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
epss 0.00498 https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1588306
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000180
cvssv3.1 4.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-xqj7-j8j5-f2xr
cvssv3.1 7.5 https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad
generic_textual HIGH https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad
cvssv3.1 7.5 https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839
generic_textual HIGH https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839
cvssv3.1 7.5 https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180
generic_textual HIGH https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180
cvssv3.1 7.5 https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
cvssv3.1 7.5 https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
generic_textual HIGH https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2018-1000180
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-1000180
cvssv3.1 9.8 https://security.netapp.com/advisory/ntap-20190204-0003
generic_textual CRITICAL https://security.netapp.com/advisory/ntap-20190204-0003
generic_textual Medium https://www.bouncycastle.org/jira/browse/BJA-694
cvssv3.1 7.5 https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test
generic_textual HIGH https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test
cvssv3.1 7.5 https://www.debian.org/security/2018/dsa-4233
generic_textual HIGH https://www.debian.org/security/2018/dsa-4233
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuapr2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuapr2020.html
cvssv3.1 7.5 https://www.oracle.com/security-alerts/cpuApr2021.html
generic_textual HIGH https://www.oracle.com/security-alerts/cpuApr2021.html
cvssv3.1 9.8 https://www.oracle.com/security-alerts/cpuoct2020.html
generic_textual CRITICAL https://www.oracle.com/security-alerts/cpuoct2020.html
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
generic_textual LOW https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
cvssv3.1 9.8 https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
generic_textual CRITICAL https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
cvssv3.1 5.9 https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
generic_textual MODERATE https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
cvssv3.1 7.5 http://www.securityfocus.com/bid/106567
generic_textual HIGH http://www.securityfocus.com/bid/106567
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-1000180.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000180.json
https://api.first.org/data/v1/epss?cve=CVE-2018-1000180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000180
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad
https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839
https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
https://security.netapp.com/advisory/ntap-20190204-0003
https://security.netapp.com/advisory/ntap-20190204-0003/
https://www.bouncycastle.org/jira/browse/BJA-694
https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test
https://www.debian.org/security/2018/dsa-4233
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
http://www.securityfocus.com/bid/106567
1588306 https://bugzilla.redhat.com/show_bug.cgi?id=1588306
900843 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900843
cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*
cpe:2.3:a:bouncycastle:fips_java_api:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:fips_java_api:*:*:*:*:*:*:*:*
cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:11.1.1.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:11.1.1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:business_transaction_management:12.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:business_transaction_management:12.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_converged_application_server:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:managed_file_transfer:12.1.3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:managed_file_transfer:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:managed_file_transfer:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_convenience_and_fuel_pos_software:2.8.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_convenience_and_fuel_pos_software:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:soa_suite:12.1.3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:soa_suite:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:soa_suite:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:soa_suite:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:11.1.1.9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:webcenter_portal:11.1.1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:*
CVE-2018-1000180 https://nvd.nist.gov/vuln/detail/CVE-2018-1000180
GHSA-xqj7-j8j5-f2xr https://github.com/advisories/GHSA-xqj7-j8j5-f2xr
RHSA-2018:2423 https://access.redhat.com/errata/RHSA-2018:2423
RHSA-2018:2424 https://access.redhat.com/errata/RHSA-2018:2424
RHSA-2018:2425 https://access.redhat.com/errata/RHSA-2018:2425
RHSA-2018:2428 https://access.redhat.com/errata/RHSA-2018:2428
RHSA-2018:2643 https://access.redhat.com/errata/RHSA-2018:2643
RHSA-2018:2669 https://access.redhat.com/errata/RHSA-2018:2669
RHSA-2019:0877 https://access.redhat.com/errata/RHSA-2019:0877
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000180.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000180
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-1000180
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20190204-0003
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.debian.org/security/2018/dsa-4233
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuapr2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://www.oracle.com/security-alerts/cpuApr2021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/security-alerts/cpuoct2020.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at http://www.securityfocus.com/bid/106567
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.41757
EPSS Score 0.00221
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.