Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/etcd@3.4.23-4
Typedeb
Namespacedebian
Nameetcd
Version3.4.23-4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.5.16-4
Latest_non_vulnerable_version3.5.16-4
Affected_by_vulnerabilities
0
url VCID-my73-sc8s-3faj
vulnerability_id VCID-my73-sc8s-3faj
summary
etcd Key name can be accessed via LeaseTimeToLive API
### Impact
LeaseTimeToLive API allows access to key names (not value) associated to a lease when `Keys` parameter is true, even a user doesn't have read permission to the keys. The impact is limited to a cluster which enables auth (RBAC).

### Patches
< v3.4.26 and < v3.5.9 are affected.

### Workarounds
No.

### Reporter
Yoni Rozenshein
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32082.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32082.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32082
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47014
published_at 2026-04-21T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46991
published_at 2026-04-02T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.4701
published_at 2026-04-04T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46957
published_at 2026-04-07T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.47011
published_at 2026-04-08T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47008
published_at 2026-04-09T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47033
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.47006
published_at 2026-04-12T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47013
published_at 2026-04-13T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.4707
published_at 2026-04-16T12:55:00Z
10
value 0.00239
scoring_system epss
scoring_elements 0.47065
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32082
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32082
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32082
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/etcd-io/etcd
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/etcd-io/etcd
5
reference_url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.4.md
6
reference_url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md
7
reference_url https://github.com/etcd-io/etcd/pull/15656
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/pull/15656
8
reference_url https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-24T21:29:19Z/
url https://github.com/etcd-io/etcd/security/advisories/GHSA-3p4g-rcw5-8298
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32082
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-32082
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036295
reference_id 1036295
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036295
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2208131
reference_id 2208131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2208131
12
reference_url https://access.redhat.com/errata/RHSA-2023:3441
reference_id RHSA-2023:3441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3441
fixed_packages
0
url pkg:deb/debian/etcd@3.5.16-4
purl pkg:deb/debian/etcd@3.5.16-4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-4
aliases CVE-2023-32082, GHSA-3p4g-rcw5-8298
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my73-sc8s-3faj
1
url VCID-pb9m-ts3k-uban
vulnerability_id VCID-pb9m-ts3k-uban
summary
Etcd-io Improper Authentication vulnerability
Authentication vulnerability found in Etcd-io v.3.4.10 allows remote attackers to escalate privileges via the debug function.

This has been fixed in v.[3.5.8](https://github.com/etcd-io/etcd/blob/main/CHANGELOG/CHANGELOG-3.5.md#etcd-server) and was also backported to [3.4](https://github.com/etcd-io/etcd/pull/15655) and [3.5](https://github.com/etcd-io/etcd/pull/15653).
references
0
reference_url http://etcd.com
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-14T17:24:41Z/
url http://etcd.com
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28235.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28235.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28235
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59676
published_at 2026-04-12T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59693
published_at 2026-04-11T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59673
published_at 2026-04-09T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.5966
published_at 2026-04-08T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59609
published_at 2026-04-07T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.5964
published_at 2026-04-04T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59682
published_at 2026-04-21T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59698
published_at 2026-04-18T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.5969
published_at 2026-04-16T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59657
published_at 2026-04-13T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69348
published_at 2026-04-02T12:55:00Z
11
value 0.00598
scoring_system epss
scoring_elements 0.69336
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28235
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28235
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/etcd-io/etcd
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-14T17:24:41Z/
url https://github.com/etcd-io/etcd
6
reference_url https://github.com/etcd-io/etcd/pull/15648
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-14T17:24:41Z/
url https://github.com/etcd-io/etcd/pull/15648
7
reference_url https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-14T17:24:41Z/
url https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj_2.png
8
reference_url https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-14T17:24:41Z/
url https://github.com/lucyxss/etcd-3.4.10-test/blob/master/temp4cj.png
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-28235
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-28235
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034840
reference_id 1034840
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034840
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2184441
reference_id 2184441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2184441
12
reference_url https://access.redhat.com/errata/RHSA-2023:3441
reference_id RHSA-2023:3441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3441
13
reference_url https://access.redhat.com/errata/RHSA-2023:3445
reference_id RHSA-2023:3445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3445
14
reference_url https://access.redhat.com/errata/RHSA-2023:3447
reference_id RHSA-2023:3447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3447
15
reference_url https://usn.ubuntu.com/6189-1/
reference_id USN-6189-1
reference_type
scores
url https://usn.ubuntu.com/6189-1/
fixed_packages
0
url pkg:deb/debian/etcd@3.5.16-4
purl pkg:deb/debian/etcd@3.5.16-4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.5.16-4
aliases CVE-2021-28235, GHSA-gmph-wf7j-9gcm
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pb9m-ts3k-uban
Fixing_vulnerabilities
0
url VCID-7565-6bvk-mqgx
vulnerability_id VCID-7565-6bvk-mqgx
summary
DNS Rebinding in etcd
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1099.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1099
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.2073
published_at 2026-04-21T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20777
published_at 2026-04-01T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20929
published_at 2026-04-02T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-04T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20701
published_at 2026-04-07T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20778
published_at 2026-04-08T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20839
published_at 2026-04-09T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20856
published_at 2026-04-11T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20812
published_at 2026-04-12T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.2076
published_at 2026-04-13T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20751
published_at 2026-04-16T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20743
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1099
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552717
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1552717
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1099
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56
6
reference_url https://github.com/coreos/etcd/issues/9353
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/etcd/issues/9353
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1099
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1099
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921156
reference_id 921156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921156
fixed_packages
0
url pkg:deb/debian/etcd@3.4.23-4
purl pkg:deb/debian/etcd@3.4.23-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4
aliases CVE-2018-1099, GHSA-wf43-55jj-vwq8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7565-6bvk-mqgx
1
url VCID-ud4m-y2s3-nban
vulnerability_id VCID-ud4m-y2s3-nban
summary
etcd Cross-site Request Forgery (CSRF)
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1098.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1098
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49588
published_at 2026-04-21T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49618
published_at 2026-04-18T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.4962
published_at 2026-04-16T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49572
published_at 2026-04-12T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49574
published_at 2026-04-13T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49525
published_at 2026-04-01T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49555
published_at 2026-04-02T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49583
published_at 2026-04-04T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49535
published_at 2026-04-07T12:55:00Z
9
value 0.00262
scoring_system epss
scoring_elements 0.4959
published_at 2026-04-08T12:55:00Z
10
value 0.00262
scoring_system epss
scoring_elements 0.49584
published_at 2026-04-09T12:55:00Z
11
value 0.00262
scoring_system epss
scoring_elements 0.49601
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1098
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552714
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1552714
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1098
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56
6
reference_url https://github.com/coreos/etcd/issues/9353
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/coreos/etcd/issues/9353
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1098
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1098
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921156
reference_id 921156
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921156
fixed_packages
0
url pkg:deb/debian/etcd@3.4.23-4
purl pkg:deb/debian/etcd@3.4.23-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-my73-sc8s-3faj
1
vulnerability VCID-pb9m-ts3k-uban
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4
aliases CVE-2018-1098, GHSA-5gjm-fj42-x983
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ud4m-y2s3-nban
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/etcd@3.4.23-4