{"url":"http://public2.vulnerablecode.io/api/packages/107242?format=json","purl":"pkg:rpm/redhat/glusterfs@3.12.2-25?arch=el7rhgs","type":"rpm","namespace":"redhat","name":"glusterfs","version":"3.12.2-25","qualifiers":{"arch":"el7rhgs"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35987?format=json","vulnerability_id":"VCID-36tz-6ahe-9uaq","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14659.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14659","reference_id":"","reference_type":"","scores":[{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84152","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84206","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84231","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84225","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84244","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84283","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84306","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14659"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635929","reference_id":"1635929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14659"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36tz-6ahe-9uaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35985?format=json","vulnerability_id":"VCID-f8u5-fz7d-vke2","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14653.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14653.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14653","reference_id":"","reference_type":"","scores":[{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81611","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81645","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81675","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81714","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01596","scoring_system":"epss","scoring_elements":"0.81774","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14653"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14653","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14653"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633431","reference_id":"1633431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1633431"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14653"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f8u5-fz7d-vke2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35986?format=json","vulnerability_id":"VCID-j851-dqg2-akg1","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14654.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14654","reference_id":"","reference_type":"","scores":[{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83807","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83831","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.8384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02023","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1631576","reference_id":"1631576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1631576"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14654"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j851-dqg2-akg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35988?format=json","vulnerability_id":"VCID-j8km-drfm-vqbn","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14660.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14660","reference_id":"","reference_type":"","scores":[{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81765","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81775","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01601","scoring_system":"epss","scoring_elements":"0.81798","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14660"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635926","reference_id":"1635926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1635926"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14660"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8km-drfm-vqbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35983?format=json","vulnerability_id":"VCID-jzru-ne7n-v7eg","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14651.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14651","reference_id":"","reference_type":"","scores":[{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.8432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84384","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84414","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84443","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02192","scoring_system":"epss","scoring_elements":"0.84475","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14651"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632557","reference_id":"1632557","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632557"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14651"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzru-ne7n-v7eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35984?format=json","vulnerability_id":"VCID-thnt-fw6p-dyah","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14652.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14652","reference_id":"","reference_type":"","scores":[{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84701","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84725","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.8475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84746","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.8474","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84761","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84763","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02302","scoring_system":"epss","scoring_elements":"0.84813","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14652"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632974","reference_id":"1632974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1632974"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14652"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-thnt-fw6p-dyah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35989?format=json","vulnerability_id":"VCID-wvz7-8dse-3bb8","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14661.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14661.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14661","reference_id":"","reference_type":"","scores":[{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85473","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.8549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85538","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85557","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85579","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02567","scoring_system":"epss","scoring_elements":"0.85605","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14661","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636880","reference_id":"1636880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1636880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997","reference_id":"912997","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912997"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3431","reference_id":"RHSA-2018:3431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3432","reference_id":"RHSA-2018:3432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-14661"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvz7-8dse-3bb8"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.12.2-25%3Farch=el7rhgs"}