{"url":"http://public2.vulnerablecode.io/api/packages/107240?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.2-20181026.0?arch=el7_6","type":"rpm","namespace":"redhat","name":"redhat-virtualization-host","version":"4.2-20181026.0","qualifiers":{"arch":"el7_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35987?format=json","vulnerability_id":"VCID-36tz-6ahe-9uaq","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14659.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14659","reference_id":"","reference_type":"","scores":[{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84152","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84206","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84231","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84244","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84332","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84349","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84348","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84364","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84396","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635929","reference_id":"1635929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14659"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36tz-6ahe-9uaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35976?format=json","vulnerability_id":"VCID-52pw-akc2-7bgp","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10923.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10923","reference_id":"","reference_type":"","scores":[{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79082","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7908","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79096","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79133","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610659","reference_id":"1610659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610659"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10923"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52pw-akc2-7bgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35980?format=json","vulnerability_id":"VCID-75zj-zdzh-u3bm","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10928.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10928","reference_id":"","reference_type":"","scores":[{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8195","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82154","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82151","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8221","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612659","reference_id":"1612659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612659"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10928"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75zj-zdzh-u3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35982?format=json","vulnerability_id":"VCID-7gk7-p9kr-ryhm","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10930.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10930.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10930","reference_id":"","reference_type":"","scores":[{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80009","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.8006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.8009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80118","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80154","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80189","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80187","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80202","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80243","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612664","reference_id":"1612664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612664"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10930"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gk7-p9kr-ryhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35974?format=json","vulnerability_id":"VCID-9dzz-z96k-m3de","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10913.json","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10913","reference_id":"","reference_type":"","scores":[{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.7642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76472","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76495","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76501","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76531","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76549","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76536","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76553","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607618","reference_id":"1607618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607618"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10913"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dzz-z96k-m3de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/5792?format=json","vulnerability_id":"VCID-9qz7-3cqa-tyd3","summary":"Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2018:3497","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHBA-2018:3497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3347","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3406","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3505","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000805.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000805","reference_id":"","reference_type":"","scores":[{"value":"0.00368","scoring_system":"epss","scoring_elements":"0.58831","published_at":"2026-05-14T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60722","published_at":"2026-04-26T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60713","published_at":"2026-04-29T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.6067","published_at":"2026-05-05T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60717","published_at":"2026-05-07T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60774","published_at":"2026-05-09T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60736","published_at":"2026-05-11T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60763","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.6205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62068","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62063","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62021","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62032","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.62015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61996","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00421","scoring_system":"epss","scoring_elements":"0.61964","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/advisories/GHSA-f2j6-wrhh-v25m","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-f2j6-wrhh-v25m"},{"reference_url":"https://github.com/paramiko/paramiko","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/paramiko/paramiko"},{"reference_url":"https://github.com/paramiko/paramiko/issues/1283","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/paramiko/paramiko/issues/1283"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2018-69.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2018-69.yaml"},{"reference_url":"https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html"},{"reference_url":"https://usn.ubuntu.com/3796-1","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3796-1"},{"reference_url":"https://usn.ubuntu.com/3796-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3796-1/"},{"reference_url":"https://usn.ubuntu.com/3796-2","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3796-2"},{"reference_url":"https://usn.ubuntu.com/3796-2/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3796-2/"},{"reference_url":"https://usn.ubuntu.com/3796-3","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3796-3"},{"reference_url":"https://usn.ubuntu.com/3796-3/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3796-3/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637263","reference_id":"1637263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1637263"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910760","reference_id":"910760","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=910760"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000805","reference_id":"CVE-2018-1000805","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"}],"fixed_packages":[],"aliases":["CVE-2018-1000805","GHSA-f2j6-wrhh-v25m","PYSEC-2018-69"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9qz7-3cqa-tyd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73390?format=json","vulnerability_id":"VCID-btxr-2zwf-hfdc","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10873.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10873","reference_id":"","reference_type":"","scores":[{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78911","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78946","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78954","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79013","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7902","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7905","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79072","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79088","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79087","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79102","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79139","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596008","reference_id":"1596008","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1596008"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906315","reference_id":"906315","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906315"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906316","reference_id":"906316","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2731","reference_id":"RHSA-2018:2731","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2731"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2732","reference_id":"RHSA-2018:2732","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2732"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/3751-1/","reference_id":"USN-3751-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3751-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10873"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-btxr-2zwf-hfdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35973?format=json","vulnerability_id":"VCID-dnzw-ykw7-rfds","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10911.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10911","reference_id":"","reference_type":"","scores":[{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88989","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88992","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.89011","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601657","reference_id":"1601657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601657"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2892","reference_id":"RHSA-2018:2892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3242","reference_id":"RHSA-2018:3242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10911"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dnzw-ykw7-rfds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35985?format=json","vulnerability_id":"VCID-f8u5-fz7d-vke2","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14653.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14653","reference_id":"","reference_type":"","scores":[{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81796","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.8182","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81817","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81833","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81874","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633431","reference_id":"1633431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633431"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14653"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f8u5-fz7d-vke2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35986?format=json","vulnerability_id":"VCID-j851-dqg2-akg1","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14654.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14654","reference_id":"","reference_type":"","scores":[{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.8384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83887","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83904","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83903","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.8392","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83954","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1631576","reference_id":"1631576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1631576"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14654"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j851-dqg2-akg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35988?format=json","vulnerability_id":"VCID-j8km-drfm-vqbn","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14660.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14660","reference_id":"","reference_type":"","scores":[{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81765","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81775","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81798","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81819","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81844","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81841","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81858","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81899","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14660"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635926","reference_id":"1635926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635926"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14660"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8km-drfm-vqbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35979?format=json","vulnerability_id":"VCID-kzxv-bbgs-nfgr","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10927.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10927.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10927","reference_id":"","reference_type":"","scores":[{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85803","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85959","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85977","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85976","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85989","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.86025","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612658","reference_id":"1612658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10927"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzxv-bbgs-nfgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47950?format=json","vulnerability_id":"VCID-mbcb-7zmf-2yah","summary":"Multiple vulnerabilities have been found in Samba, the worst of\n    which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10858","reference_id":"","reference_type":"","scores":[{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90595","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.9065","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90648","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90663","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90665","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90661","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90674","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90693","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90707","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90705","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90714","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0594","scoring_system":"epss","scoring_elements":"0.90727","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10919"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612805","reference_id":"1612805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612805"},{"reference_url":"https://security.gentoo.org/glsa/202003-52","reference_id":"GLSA-202003-52","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2612","reference_id":"RHSA-2018:2612","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2612"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2613","reference_id":"RHSA-2018:2613","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3056","reference_id":"RHSA-2018:3056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3056"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/3738-1/","reference_id":"USN-3738-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3738-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10858"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mbcb-7zmf-2yah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35978?format=json","vulnerability_id":"VCID-stnp-v3hs-e7dr","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10926.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10926","reference_id":"","reference_type":"","scores":[{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.805","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.8052","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80514","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80572","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1613143","reference_id":"1613143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1613143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10926"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stnp-v3hs-e7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35981?format=json","vulnerability_id":"VCID-sxxq-d57y-efd2","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10929.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10929","reference_id":"","reference_type":"","scores":[{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82315","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82311","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82327","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82367","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612660","reference_id":"1612660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612660"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10929"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxxq-d57y-efd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35984?format=json","vulnerability_id":"VCID-thnt-fw6p-dyah","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14652.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14652","reference_id":"","reference_type":"","scores":[{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84725","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84746","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.8474","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84813","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84838","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84855","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84867","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84899","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14652"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632974","reference_id":"1632974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632974"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14652"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thnt-fw6p-dyah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35975?format=json","vulnerability_id":"VCID-urpc-xzkg-qyeu","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10914.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10914","reference_id":"","reference_type":"","scores":[{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.8901","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88977","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.9048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90489","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90479","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607617","reference_id":"1607617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607617"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10914"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-urpc-xzkg-qyeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35971?format=json","vulnerability_id":"VCID-w536-u3j5-jqc3","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10904.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10904.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10904","reference_id":"","reference_type":"","scores":[{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78969","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79127","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79144","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79142","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79157","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79193","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601298","reference_id":"1601298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601298"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10904"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w536-u3j5-jqc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35989?format=json","vulnerability_id":"VCID-wvz7-8dse-3bb8","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14661.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14661","reference_id":"","reference_type":"","scores":[{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.8549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85538","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85579","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85605","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85628","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85646","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85641","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85654","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.8569","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636880","reference_id":"1636880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14661"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvz7-8dse-3bb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35972?format=json","vulnerability_id":"VCID-wxj7-b5cz-67bx","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10907.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10907.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10907","reference_id":"","reference_type":"","scores":[{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84021","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84038","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84054","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84087","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601642","reference_id":"1601642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601642"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10907"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxj7-b5cz-67bx"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.2-20181026.0%3Farch=el7_6"}