{"url":"http://public2.vulnerablecode.io/api/packages/107482?format=json","purl":"pkg:rpm/redhat/glusterfs@3.12.2-18?arch=el7rhgs","type":"rpm","namespace":"redhat","name":"glusterfs","version":"3.12.2-18","qualifiers":{"arch":"el7rhgs"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35976?format=json","vulnerability_id":"VCID-52pw-akc2-7bgp","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10923.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10923","reference_id":"","reference_type":"","scores":[{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.7898","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.78979","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79047","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01206","scoring_system":"epss","scoring_elements":"0.79068","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610659","reference_id":"1610659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610659"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10923"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52pw-akc2-7bgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35980?format=json","vulnerability_id":"VCID-75zj-zdzh-u3bm","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10928.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10928.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10928","reference_id":"","reference_type":"","scores":[{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8195","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82053","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.82109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.8213","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612659","reference_id":"1612659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612659"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10928"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75zj-zdzh-u3bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35982?format=json","vulnerability_id":"VCID-7gk7-p9kr-ryhm","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10930.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10930.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10930","reference_id":"","reference_type":"","scores":[{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80009","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.8006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.8009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80118","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80139","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80154","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01345","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10930"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612664","reference_id":"1612664","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612664"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10930"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gk7-p9kr-ryhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35974?format=json","vulnerability_id":"VCID-9dzz-z96k-m3de","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10913.json","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10913","reference_id":"","reference_type":"","scores":[{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.7642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76459","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76472","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76495","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76501","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00956","scoring_system":"epss","scoring_elements":"0.76531","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607618","reference_id":"1607618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607618"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10913"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dzz-z96k-m3de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35973?format=json","vulnerability_id":"VCID-dnzw-ykw7-rfds","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10911.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10911","reference_id":"","reference_type":"","scores":[{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04332","scoring_system":"epss","scoring_elements":"0.88978","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601657","reference_id":"1601657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601657"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2892","reference_id":"RHSA-2018:2892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2892"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3242","reference_id":"RHSA-2018:3242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10911"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dnzw-ykw7-rfds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35979?format=json","vulnerability_id":"VCID-kzxv-bbgs-nfgr","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10927.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10927.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10927","reference_id":"","reference_type":"","scores":[{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85803","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.8588","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85896","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85887","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85909","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02697","scoring_system":"epss","scoring_elements":"0.85959","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612658","reference_id":"1612658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10927"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzxv-bbgs-nfgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35978?format=json","vulnerability_id":"VCID-stnp-v3hs-e7dr","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10926.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10926","reference_id":"","reference_type":"","scores":[{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80371","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80382","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80401","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80385","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80409","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80445","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.805","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1613143","reference_id":"1613143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1613143"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10926"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stnp-v3hs-e7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35981?format=json","vulnerability_id":"VCID-sxxq-d57y-efd2","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10929.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10929","reference_id":"","reference_type":"","scores":[{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82111","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82174","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82241","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.8227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82293","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612660","reference_id":"1612660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1612660"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10929"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sxxq-d57y-efd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35975?format=json","vulnerability_id":"VCID-urpc-xzkg-qyeu","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10914.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10914","reference_id":"","reference_type":"","scores":[{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88977","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88947","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88955","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04331","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.9048","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90489","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05767","scoring_system":"epss","scoring_elements":"0.90449","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607617","reference_id":"1607617","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1607617"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10914"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-urpc-xzkg-qyeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35971?format=json","vulnerability_id":"VCID-w536-u3j5-jqc3","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10904.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10904.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10904","reference_id":"","reference_type":"","scores":[{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78969","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79026","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79044","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01214","scoring_system":"epss","scoring_elements":"0.79127","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10904"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601298","reference_id":"1601298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601298"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10904"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w536-u3j5-jqc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35972?format=json","vulnerability_id":"VCID-wxj7-b5cz-67bx","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10907.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10907.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10907","reference_id":"","reference_type":"","scores":[{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83939","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.83999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0206","scoring_system":"epss","scoring_elements":"0.84021","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10907"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601642","reference_id":"1601642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601642"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215","reference_id":"909215","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909215"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2607","reference_id":"RHSA-2018:2607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2608","reference_id":"RHSA-2018:2608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3470","reference_id":"RHSA-2018:3470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3470"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-10907"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxj7-b5cz-67bx"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.12.2-18%3Farch=el7rhgs"}