Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/paramiko@1.13.2
Typepypi
Namespace
Nameparamiko
Version1.13.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.0.9
Latest_non_vulnerable_version3.4.0
Affected_by_vulnerabilities
0
url VCID-3jh2-znva-2bb6
vulnerability_id VCID-3jh2-znva-2bb6
summary transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:0591
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0591
1
reference_url https://access.redhat.com/errata/RHSA-2018:0646
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0646
2
reference_url https://access.redhat.com/errata/RHSA-2018:1124
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1124
3
reference_url https://access.redhat.com/errata/RHSA-2018:1125
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1125
4
reference_url https://access.redhat.com/errata/RHSA-2018:1213
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1213
5
reference_url https://access.redhat.com/errata/RHSA-2018:1274
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1274
6
reference_url https://access.redhat.com/errata/RHSA-2018:1328
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1328
7
reference_url https://access.redhat.com/errata/RHSA-2018:1525
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1525
8
reference_url https://access.redhat.com/errata/RHSA-2018:1972
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:1972
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7750.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7750.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7750
reference_id
reference_type
scores
0
value 0.13825
scoring_system epss
scoring_elements 0.94289
published_at 2026-04-13T12:55:00Z
1
value 0.13825
scoring_system epss
scoring_elements 0.94303
published_at 2026-04-16T12:55:00Z
2
value 0.21328
scoring_system epss
scoring_elements 0.95672
published_at 2026-04-07T12:55:00Z
3
value 0.21328
scoring_system epss
scoring_elements 0.9568
published_at 2026-04-08T12:55:00Z
4
value 0.21328
scoring_system epss
scoring_elements 0.95684
published_at 2026-04-09T12:55:00Z
5
value 0.21328
scoring_system epss
scoring_elements 0.95688
published_at 2026-04-12T12:55:00Z
6
value 0.21328
scoring_system epss
scoring_elements 0.95655
published_at 2026-04-01T12:55:00Z
7
value 0.21328
scoring_system epss
scoring_elements 0.95669
published_at 2026-04-04T12:55:00Z
8
value 0.21328
scoring_system epss
scoring_elements 0.95664
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7750
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7750
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://github.com/advisories/GHSA-232r-66cg-79px
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-232r-66cg-79px
14
reference_url https://github.com/paramiko/paramiko
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko
15
reference_url https://github.com/paramiko/paramiko/blob/e861c7697622774071ce73b46ffe8817eacdedfa/sites/www/changelog.rst?plain=1#L759-L763
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko/blob/e861c7697622774071ce73b46ffe8817eacdedfa/sites/www/changelog.rst?plain=1#L759-L763
16
reference_url https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst
17
reference_url https://github.com/paramiko/paramiko/commit/e9dfd854bdaf8af15d7834f7502a0451d217bb8c
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko/commit/e9dfd854bdaf8af15d7834f7502a0451d217bb8c
18
reference_url https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516
19
reference_url https://github.com/paramiko/paramiko/issues/1175
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko/issues/1175
20
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2018-19.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2018-19.yaml
21
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
22
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html
23
reference_url https://usn.ubuntu.com/3603-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3603-1
24
reference_url https://usn.ubuntu.com/3603-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3603-1/
25
reference_url https://usn.ubuntu.com/3603-2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3603-2
26
reference_url https://usn.ubuntu.com/3603-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3603-2/
27
reference_url https://web.archive.org/web/20190831123128/http://www.securityfocus.com/bid/103713
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20190831123128/http://www.securityfocus.com/bid/103713
28
reference_url https://www.exploit-db.com/exploits/45712
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.exploit-db.com/exploits/45712
29
reference_url https://www.exploit-db.com/exploits/45712/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/45712/
30
reference_url http://www.securityfocus.com/bid/103713
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/103713
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1557130
reference_id 1557130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1557130
32
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892859
reference_id 892859
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892859
33
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45712.py
reference_id CVE-2018-7750
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/45712.py
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-7750
reference_id CVE-2018-7750
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-7750
fixed_packages
0
url pkg:pypi/paramiko@1.17.6
purl pkg:pypi/paramiko@1.17.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@1.17.6
1
url pkg:pypi/paramiko@1.18.5
purl pkg:pypi/paramiko@1.18.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@1.18.5
2
url pkg:pypi/paramiko@2.0.8
purl pkg:pypi/paramiko@2.0.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.0.8
3
url pkg:pypi/paramiko@2.1.5
purl pkg:pypi/paramiko@2.1.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.1.5
4
url pkg:pypi/paramiko@2.2.3
purl pkg:pypi/paramiko@2.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.2.3
5
url pkg:pypi/paramiko@2.3.2
purl pkg:pypi/paramiko@2.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.3.2
6
url pkg:pypi/paramiko@2.4.1
purl pkg:pypi/paramiko@2.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9qz7-3cqa-tyd3
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.4.1
aliases CVE-2018-7750, GHSA-232r-66cg-79px, PYSEC-2018-19
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3jh2-znva-2bb6
1
url VCID-9qz7-3cqa-tyd3
vulnerability_id VCID-9qz7-3cqa-tyd3
summary Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
references
0
reference_url https://access.redhat.com/errata/RHBA-2018:3497
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2018:3497
1
reference_url https://access.redhat.com/errata/RHSA-2018:3347
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3347
2
reference_url https://access.redhat.com/errata/RHSA-2018:3406
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3406
3
reference_url https://access.redhat.com/errata/RHSA-2018:3505
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3505
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000805.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000805.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000805
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.62063
published_at 2026-04-16T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61891
published_at 2026-04-01T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61964
published_at 2026-04-02T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.61996
published_at 2026-04-04T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61965
published_at 2026-04-07T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.62015
published_at 2026-04-08T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.62032
published_at 2026-04-09T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62053
published_at 2026-04-11T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62042
published_at 2026-04-12T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62021
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/advisories/GHSA-f2j6-wrhh-v25m
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-f2j6-wrhh-v25m
9
reference_url https://github.com/paramiko/paramiko
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko
10
reference_url https://github.com/paramiko/paramiko/issues/1283
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/paramiko/paramiko/issues/1283
11
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2018-69.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2018-69.yaml
12
reference_url https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt
13
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
14
reference_url https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html
15
reference_url https://usn.ubuntu.com/3796-1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3796-1
16
reference_url https://usn.ubuntu.com/3796-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3796-1/
17
reference_url https://usn.ubuntu.com/3796-2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3796-2
18
reference_url https://usn.ubuntu.com/3796-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3796-2/
19
reference_url https://usn.ubuntu.com/3796-3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3796-3
20
reference_url https://usn.ubuntu.com/3796-3/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3796-3/
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1637263
reference_id 1637263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1637263
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910760
reference_id 910760
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910760
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000805
reference_id CVE-2018-1000805
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000805
24
reference_url https://access.redhat.com/errata/RHSA-2018:3470
reference_id RHSA-2018:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3470
fixed_packages
0
url pkg:pypi/paramiko@2.0.9
purl pkg:pypi/paramiko@2.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.0.9
1
url pkg:pypi/paramiko@2.1.6
purl pkg:pypi/paramiko@2.1.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.1.6
2
url pkg:pypi/paramiko@2.2.4
purl pkg:pypi/paramiko@2.2.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.2.4
3
url pkg:pypi/paramiko@2.3.3
purl pkg:pypi/paramiko@2.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.3.3
4
url pkg:pypi/paramiko@2.4.2
purl pkg:pypi/paramiko@2.4.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@2.4.2
aliases CVE-2018-1000805, GHSA-f2j6-wrhh-v25m, PYSEC-2018-69
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qz7-3cqa-tyd3
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/paramiko@1.13.2