{"url":"http://public2.vulnerablecode.io/api/packages/1049601?format=json","purl":"pkg:deb/debian/glusterfs@3.0.5-1","type":"deb","namespace":"debian","name":"glusterfs","version":"3.0.5-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"5.5-3","latest_non_vulnerable_version":"11.1-3~bpo12+1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35987?format=json","vulnerability_id":"VCID-36tz-6ahe-9uaq","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14659.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14659","reference_id":"","reference_type":"","scores":[{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84152","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84206","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84231","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84244","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84349","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84348","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84364","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84396","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635929","reference_id":"1635929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14659"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36tz-6ahe-9uaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35976?format=json","vulnerability_id":"VCID-52pw-akc2-7bgp","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10923.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10923","reference_id":"","reference_type":"","scores":[{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79082","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7908","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79096","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79133","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610659","reference_id":"1610659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610659"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10923"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52pw-akc2-7bgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35980?format=json","vulnerability_id":"VCID-75zj-zdzh-u3bm","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10928.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10928","reference_id":"","reference_type":"","scores":[{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8195","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82154","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82151","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8221","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612659","reference_id":"1612659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612659"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10928"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75zj-zdzh-u3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35977?format=json","vulnerability_id":"VCID-7bkp-augt-qbga","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10924.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10924","reference_id":"","reference_type":"","scores":[{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72571","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72579","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72611","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72629","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72703","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72712","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72708","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.727","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72731","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72719","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72798","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10924"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1611785","reference_id":"1611785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1611785"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10924"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7bkp-augt-qbga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86925?format=json","vulnerability_id":"VCID-7cxm-yqwu-gbbb","summary":"GlusterFS: insecure temporary file creation","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1456.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1456.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4417","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3517","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35435","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35634","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3562","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35582","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35294","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35194","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35143","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35171","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35077","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.351","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4417"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80074","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80074"},{"reference_url":"http://www.securityfocus.com/bid/56522","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56522"},{"reference_url":"http://www.securitytracker.com/id?1027756","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027756"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693112","reference_id":"693112","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=693112"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=856341","reference_id":"856341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=856341"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:3.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gluster:glusterfs:3.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:3.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4417","reference_id":"CVE-2012-4417","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4417"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1456","reference_id":"RHSA-2012:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1456"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049603?format=json","purl":"pkg:deb/debian/glusterfs@3.5.2-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-36tz-6ahe-9uaq"},{"vulnerability":"VCID-52pw-akc2-7bgp"},{"vulnerability":"VCID-75zj-zdzh-u3bm"},{"vulnerability":"VCID-7bkp-augt-qbga"},{"vulnerability":"VCID-7gk7-p9kr-ryhm"},{"vulnerability":"VCID-9dzz-z96k-m3de"},{"vulnerability":"VCID-dnzw-ykw7-rfds"},{"vulnerability":"VCID-f8u5-fz7d-vke2"},{"vulnerability":"VCID-fyjt-q8ww-bkdu"},{"vulnerability":"VCID-h5qa-pcnk-w3au"},{"vulnerability":"VCID-j729-9nj3-gbam"},{"vulnerability":"VCID-j851-dqg2-akg1"},{"vulnerability":"VCID-j8km-drfm-vqbn"},{"vulnerability":"VCID-jzru-ne7n-v7eg"},{"vulnerability":"VCID-kzxv-bbgs-nfgr"},{"vulnerability":"VCID-stnp-v3hs-e7dr"},{"vulnerability":"VCID-sxxq-d57y-efd2"},{"vulnerability":"VCID-thnt-fw6p-dyah"},{"vulnerability":"VCID-urpc-xzkg-qyeu"},{"vulnerability":"VCID-w536-u3j5-jqc3"},{"vulnerability":"VCID-wvz7-8dse-3bb8"},{"vulnerability":"VCID-wxj7-b5cz-67bx"},{"vulnerability":"VCID-yhpy-bgph-qqc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@3.5.2-1~bpo70%252B1"}],"aliases":["CVE-2012-4417"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7cxm-yqwu-gbbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35982?format=json","vulnerability_id":"VCID-7gk7-p9kr-ryhm","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10930.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10930.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10930","reference_id":"","reference_type":"","scores":[{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80009","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.8006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.8009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80118","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80154","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80189","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80187","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80243","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612664","reference_id":"1612664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612664"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10930"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gk7-p9kr-ryhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35974?format=json","vulnerability_id":"VCID-9dzz-z96k-m3de","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10913.json","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10913","reference_id":"","reference_type":"","scores":[{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.7642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76472","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76495","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76501","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76531","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76536","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76553","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607618","reference_id":"1607618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607618"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10913"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dzz-z96k-m3de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35973?format=json","vulnerability_id":"VCID-dnzw-ykw7-rfds","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10911.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10911","reference_id":"","reference_type":"","scores":[{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88989","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88992","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.89011","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601657","reference_id":"1601657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601657"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2892","reference_id":"RHSA-2018:2892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3242","reference_id":"RHSA-2018:3242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10911"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dnzw-ykw7-rfds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86718?format=json","vulnerability_id":"VCID-dyw1-b4w5-3bhe","summary":"GlusterFS: insecure temporary file creation","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0691.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0691.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5635.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5635","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18662","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18794","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18799","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18753","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18652","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18574","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18511","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18385","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1847","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18572","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18534","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18565","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5635"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704944","reference_id":"704944","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=886364","reference_id":"886364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=886364"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_management_console:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_native_client:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_server:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5635","reference_id":"CVE-2012-5635","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5635"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049603?format=json","purl":"pkg:deb/debian/glusterfs@3.5.2-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-36tz-6ahe-9uaq"},{"vulnerability":"VCID-52pw-akc2-7bgp"},{"vulnerability":"VCID-75zj-zdzh-u3bm"},{"vulnerability":"VCID-7bkp-augt-qbga"},{"vulnerability":"VCID-7gk7-p9kr-ryhm"},{"vulnerability":"VCID-9dzz-z96k-m3de"},{"vulnerability":"VCID-dnzw-ykw7-rfds"},{"vulnerability":"VCID-f8u5-fz7d-vke2"},{"vulnerability":"VCID-fyjt-q8ww-bkdu"},{"vulnerability":"VCID-h5qa-pcnk-w3au"},{"vulnerability":"VCID-j729-9nj3-gbam"},{"vulnerability":"VCID-j851-dqg2-akg1"},{"vulnerability":"VCID-j8km-drfm-vqbn"},{"vulnerability":"VCID-jzru-ne7n-v7eg"},{"vulnerability":"VCID-kzxv-bbgs-nfgr"},{"vulnerability":"VCID-stnp-v3hs-e7dr"},{"vulnerability":"VCID-sxxq-d57y-efd2"},{"vulnerability":"VCID-thnt-fw6p-dyah"},{"vulnerability":"VCID-urpc-xzkg-qyeu"},{"vulnerability":"VCID-w536-u3j5-jqc3"},{"vulnerability":"VCID-wvz7-8dse-3bb8"},{"vulnerability":"VCID-wxj7-b5cz-67bx"},{"vulnerability":"VCID-yhpy-bgph-qqc2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@3.5.2-1~bpo70%252B1"}],"aliases":["CVE-2012-5635"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dyw1-b4w5-3bhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35985?format=json","vulnerability_id":"VCID-f8u5-fz7d-vke2","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14653.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14653","reference_id":"","reference_type":"","scores":[{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81796","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.8182","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81817","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81833","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81874","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633431","reference_id":"1633431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633431"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14653"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f8u5-fz7d-vke2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35970?format=json","vulnerability_id":"VCID-fyjt-q8ww-bkdu","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1088.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1088","reference_id":"","reference_type":"","scores":[{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93425","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93404","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93411","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.9333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93364","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.9338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93394","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1088"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558721","reference_id":"1558721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558721"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896128","reference_id":"896128","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896128"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1088","reference_id":"CVE-2018-1088","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1088"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1136","reference_id":"RHSA-2018:1136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1137","reference_id":"RHSA-2018:1137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1275","reference_id":"RHSA-2018:1275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1524","reference_id":"RHSA-2018:1524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1524"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-1088"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyjt-q8ww-bkdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35969?format=json","vulnerability_id":"VCID-h5qa-pcnk-w3au","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10841.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10841.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10841","reference_id":"","reference_type":"","scores":[{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71813","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71726","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7176","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71755","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71586","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71616","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7166","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71697","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71702","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71706","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10841","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10841"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10841","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10841"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"},{"reference_url":"https://review.gluster.org/#/c/20328/","reference_id":"","reference_type":"","scores":[],"url":"https://review.gluster.org/#/c/20328/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1582043","reference_id":"1582043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1582043"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901968","reference_id":"901968","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901968"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10841","reference_id":"CVE-2018-10841","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10841"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1954","reference_id":"RHSA-2018:1954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1955","reference_id":"RHSA-2018:1955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1955"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10841"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h5qa-pcnk-w3au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83884?format=json","vulnerability_id":"VCID-j729-9nj3-gbam","summary":"glusterfs: Null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15096.json","reference_id":"","reference_type":"","scores":[{"value":"1.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15096","reference_id":"","reference_type":"","scores":[{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17531","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17474","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17355","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17393","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17463","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17612","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17584","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17532","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17476","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17485","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1752","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17429","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17337","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17292","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17388","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15096"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504255","reference_id":"1504255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504255"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880017","reference_id":"880017","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880017"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15096","reference_id":"CVE-2017-15096","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15096"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2017-15096"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j729-9nj3-gbam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35986?format=json","vulnerability_id":"VCID-j851-dqg2-akg1","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14654.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14654","reference_id":"","reference_type":"","scores":[{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.8384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83887","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83904","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83903","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.8392","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83954","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1631576","reference_id":"1631576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1631576"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14654"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j851-dqg2-akg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35988?format=json","vulnerability_id":"VCID-j8km-drfm-vqbn","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14660.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14660","reference_id":"","reference_type":"","scores":[{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81765","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81775","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81798","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81819","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81844","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81841","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81858","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81899","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14660"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635926","reference_id":"1635926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635926"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14660"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8km-drfm-vqbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35983?format=json","vulnerability_id":"VCID-jzru-ne7n-v7eg","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14651.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14651","reference_id":"","reference_type":"","scores":[{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.8432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84414","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84475","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84501","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84517","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84516","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84533","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84565","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14651"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632557","reference_id":"1632557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632557"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14651"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzru-ne7n-v7eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35979?format=json","vulnerability_id":"VCID-kzxv-bbgs-nfgr","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10927.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10927.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10927","reference_id":"","reference_type":"","scores":[{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85803","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85959","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85977","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85976","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.86025","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612658","reference_id":"1612658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10927"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzxv-bbgs-nfgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35978?format=json","vulnerability_id":"VCID-stnp-v3hs-e7dr","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10926.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10926","reference_id":"","reference_type":"","scores":[{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.805","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.8052","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80572","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1613143","reference_id":"1613143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1613143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10926"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stnp-v3hs-e7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35981?format=json","vulnerability_id":"VCID-sxxq-d57y-efd2","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10929.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10929","reference_id":"","reference_type":"","scores":[{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82315","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82311","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82327","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82367","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612660","reference_id":"1612660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612660"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10929"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxxq-d57y-efd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35984?format=json","vulnerability_id":"VCID-thnt-fw6p-dyah","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14652.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14652","reference_id":"","reference_type":"","scores":[{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84725","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84746","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.8474","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84813","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84838","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84855","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84867","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84899","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14652"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632974","reference_id":"1632974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632974"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14652"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thnt-fw6p-dyah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35975?format=json","vulnerability_id":"VCID-urpc-xzkg-qyeu","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10914.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10914","reference_id":"","reference_type":"","scores":[{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.8901","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88977","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.9048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90489","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90479","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607617","reference_id":"1607617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607617"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10914"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-urpc-xzkg-qyeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35971?format=json","vulnerability_id":"VCID-w536-u3j5-jqc3","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10904.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10904.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10904","reference_id":"","reference_type":"","scores":[{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78969","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79127","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79144","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79142","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79157","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79193","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601298","reference_id":"1601298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601298"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10904"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w536-u3j5-jqc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35989?format=json","vulnerability_id":"VCID-wvz7-8dse-3bb8","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14661.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14661","reference_id":"","reference_type":"","scores":[{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.8549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85538","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85579","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85605","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85628","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85646","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85641","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85654","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.8569","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636880","reference_id":"1636880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-14661"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvz7-8dse-3bb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35972?format=json","vulnerability_id":"VCID-wxj7-b5cz-67bx","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10907.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10907.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10907","reference_id":"","reference_type":"","scores":[{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84021","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84054","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84087","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601642","reference_id":"1601642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601642"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049608?format=json","purl":"pkg:deb/debian/glusterfs@5.5-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@5.5-3"}],"aliases":["CVE-2018-10907"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxj7-b5cz-67bx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86137?format=json","vulnerability_id":"VCID-yhpy-bgph-qqc2","summary":"glusterfs: fragment header infinite loop DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3619.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3619","reference_id":"","reference_type":"","scores":[{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78052","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.7809","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78094","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.7812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.7816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78166","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.7818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78236","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78227","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78246","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78288","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1138145","reference_id":"1138145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1138145"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781018","reference_id":"781018","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781018"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049604?format=json","purl":"pkg:deb/debian/glusterfs@3.5.2-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-36tz-6ahe-9uaq"},{"vulnerability":"VCID-52pw-akc2-7bgp"},{"vulnerability":"VCID-75zj-zdzh-u3bm"},{"vulnerability":"VCID-7bkp-augt-qbga"},{"vulnerability":"VCID-7gk7-p9kr-ryhm"},{"vulnerability":"VCID-9dzz-z96k-m3de"},{"vulnerability":"VCID-dnzw-ykw7-rfds"},{"vulnerability":"VCID-f8u5-fz7d-vke2"},{"vulnerability":"VCID-fyjt-q8ww-bkdu"},{"vulnerability":"VCID-h5qa-pcnk-w3au"},{"vulnerability":"VCID-j729-9nj3-gbam"},{"vulnerability":"VCID-j851-dqg2-akg1"},{"vulnerability":"VCID-j8km-drfm-vqbn"},{"vulnerability":"VCID-jzru-ne7n-v7eg"},{"vulnerability":"VCID-kzxv-bbgs-nfgr"},{"vulnerability":"VCID-stnp-v3hs-e7dr"},{"vulnerability":"VCID-sxxq-d57y-efd2"},{"vulnerability":"VCID-thnt-fw6p-dyah"},{"vulnerability":"VCID-urpc-xzkg-qyeu"},{"vulnerability":"VCID-w536-u3j5-jqc3"},{"vulnerability":"VCID-wvz7-8dse-3bb8"},{"vulnerability":"VCID-wxj7-b5cz-67bx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@3.5.2-2"}],"aliases":["CVE-2014-3619"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yhpy-bgph-qqc2"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glusterfs@3.0.5-1"}