{"url":"http://public2.vulnerablecode.io/api/packages/108819?format=json","purl":"pkg:rpm/redhat/imgbased@1.0.16-0.1?arch=el7ev","type":"rpm","namespace":"redhat","name":"imgbased","version":"1.0.16-0.1","qualifiers":{"arch":"el7ev"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73387?format=json","vulnerability_id":"VCID-6yt3-cqzy-ffd3","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1087.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1087.json"},{"reference_url":"https://access.redhat.com/security/vulnerabilities/pop_ss","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/vulnerabilities/pop_ss"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1087","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08631","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08699","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08588","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11333","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12142","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1215","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12113","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1209","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12206","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1087"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4196","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4196"},{"reference_url":"http://www.openwall.com/lists/oss-security/2018/05/08/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2018/05/08/5"},{"reference_url":"http://www.securityfocus.com/bid/104127","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104127"},{"reference_url":"http://www.securitytracker.com/id/1040862","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040862"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566837","reference_id":"1566837","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566837"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1087","reference_id":"CVE-2018-1087","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1318","reference_id":"RHSA-2018:1318","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1345","reference_id":"RHSA-2018:1345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1347","reference_id":"RHSA-2018:1347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1348","reference_id":"RHSA-2018:1348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1355","reference_id":"RHSA-2018:1355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1524","reference_id":"RHSA-2018:1524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1710","reference_id":"RHSA-2018:1710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1711","reference_id":"RHSA-2018:1711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1711"},{"reference_url":"https://usn.ubuntu.com/3641-1/","reference_id":"USN-3641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3641-1/"},{"reference_url":"https://usn.ubuntu.com/3641-2/","reference_id":"USN-3641-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3641-2/"}],"fixed_packages":[],"aliases":["CVE-2018-1087"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6yt3-cqzy-ffd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35970?format=json","vulnerability_id":"VCID-fyjt-q8ww-bkdu","summary":"Multiple vulnerabilities have been found in GlusterFS, the worst of\n    which could result in the execution of arbitrary code.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1088.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1088","reference_id":"","reference_type":"","scores":[{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93315","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93382","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.9338","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93374","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93324","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.9333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93338","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93347","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93364","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10782","scoring_system":"epss","scoring_elements":"0.93376","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1088"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1088","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1088"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558721","reference_id":"1558721","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1558721"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896128","reference_id":"896128","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896128"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1088","reference_id":"CVE-2018-1088","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1088"},{"reference_url":"https://security.gentoo.org/glsa/201904-06","reference_id":"GLSA-201904-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201904-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1136","reference_id":"RHSA-2018:1136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1137","reference_id":"RHSA-2018:1137","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1137"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1275","reference_id":"RHSA-2018:1275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1524","reference_id":"RHSA-2018:1524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1524"},{"reference_url":"https://usn.ubuntu.com/USN-4770-1/","reference_id":"USN-USN-4770-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4770-1/"}],"fixed_packages":[],"aliases":["CVE-2018-1088"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyjt-q8ww-bkdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4146?format=json","vulnerability_id":"VCID-qmav-pppv-p3e1","summary":"x86: mishandling of debug exceptions","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9"},{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/1"},{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8897.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8897","reference_id":"","reference_type":"","scores":[{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96168","published_at":"2026-05-05T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.9616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96113","published_at":"2026-04-01T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96143","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96149","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/can1357/CVE-2018-8897/","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/can1357/CVE-2018-8897/"},{"reference_url":"https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"},{"reference_url":"https://patchwork.kernel.org/patch/10386677/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.kernel.org/patch/10386677/"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180927-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180927-0002/"},{"reference_url":"https://support.apple.com/HT208742","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208742"},{"reference_url":"https://support.citrix.com/article/CTX234679","reference_id":"","reference_type":"","scores":[],"url":"https://support.citrix.com/article/CTX234679"},{"reference_url":"https://svnweb.freebsd.org/base?view=revision&revision=333368","reference_id":"","reference_type":"","scores":[],"url":"https://svnweb.freebsd.org/base?view=revision&revision=333368"},{"reference_url":"https://www.debian.org/security/2018/dsa-4196","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4196"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"https://www.exploit-db.com/exploits/44697/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44697/"},{"reference_url":"https://www.exploit-db.com/exploits/45024/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/45024/"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc"},{"reference_url":"https://www.kb.cert.org/vuls/id/631579","reference_id":"","reference_type":"","scores":[],"url":"https://www.kb.cert.org/vuls/id/631579"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_18_21","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/support/security/Synology_SA_18_21"},{"reference_url":"https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en"},{"reference_url":"http://www.securityfocus.com/bid/104071","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104071"},{"reference_url":"http://www.securitytracker.com/id/1040744","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040744"},{"reference_url":"http://www.securitytracker.com/id/1040849","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040849"},{"reference_url":"http://www.securitytracker.com/id/1040861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040861"},{"reference_url":"http://www.securitytracker.com/id/1040866","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040866"},{"reference_url":"http://www.securitytracker.com/id/1040882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1567074","reference_id":"1567074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1567074"},{"reference_url":"https://security.archlinux.org/AVG-701","reference_id":"AVG-701","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-701"},{"reference_url":"https://security.archlinux.org/AVG-702","reference_id":"AVG-702","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-702"},{"reference_url":"https://security.archlinux.org/AVG-703","reference_id":"AVG-703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-703"},{"reference_url":"https://security.archlinux.org/AVG-704","reference_id":"AVG-704","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-704"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*","reference_id":"cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*"},{"reference_url":"https://github.com/can1357/CVE-2018-8897","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://github.com/can1357/CVE-2018-8897"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/44697.txt","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/44697.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/45024.rb","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/45024.rb"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8897","reference_id":"CVE-2018-8897","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8897"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/b40a1467232a84c19b0c8f16a36e2b9973cab951/modules/exploits/windows/local/mov_ss.rb","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/b40a1467232a84c19b0c8f16a36e2b9973cab951/modules/exploits/windows/local/mov_ss.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1318","reference_id":"RHSA-2018:1318","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1319","reference_id":"RHSA-2018:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1345","reference_id":"RHSA-2018:1345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1346","reference_id":"RHSA-2018:1346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1347","reference_id":"RHSA-2018:1347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1348","reference_id":"RHSA-2018:1348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1349","reference_id":"RHSA-2018:1349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1350","reference_id":"RHSA-2018:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1351","reference_id":"RHSA-2018:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1352","reference_id":"RHSA-2018:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1353","reference_id":"RHSA-2018:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1354","reference_id":"RHSA-2018:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1355","reference_id":"RHSA-2018:1355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1524","reference_id":"RHSA-2018:1524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1710","reference_id":"RHSA-2018:1710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1711","reference_id":"RHSA-2018:1711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1711"},{"reference_url":"https://usn.ubuntu.com/3641-1/","reference_id":"USN-3641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3641-1/"},{"reference_url":"https://usn.ubuntu.com/3641-2/","reference_id":"USN-3641-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3641-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-260.html","reference_id":"XSA-260","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-260.html"}],"fixed_packages":[],"aliases":["CVE-2018-8897","XSA-260"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmav-pppv-p3e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83466?format=json","vulnerability_id":"VCID-r42j-jg5s-auda","summary":"dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1111.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1111.json"},{"reference_url":"https://access.redhat.com/security/vulnerabilities/3442151","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/security/vulnerabilities/3442151"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1111","reference_id":"","reference_type":"","scores":[{"value":"0.88233","scoring_system":"epss","scoring_elements":"0.99498","published_at":"2026-05-05T12:55:00Z"},{"value":"0.88233","scoring_system":"epss","scoring_elements":"0.99496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.9953","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99532","published_at":"2026-04-08T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-09T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99535","published_at":"2026-04-13T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.89183","scoring_system":"epss","scoring_elements":"0.99538","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1111","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1111"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CDCLLCHYFFXW354HMB5QBXOQOY5BH2EJ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CDCLLCHYFFXW354HMB5QBXOQOY5BH2EJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IDJA4QRR74TMXW34Q3DYYFPVBYRTJBI7/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IDJA4QRR74TMXW34Q3DYYFPVBYRTJBI7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMTTB54QNTPD2SK6UL32EVQHMZP6BUUD/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMTTB54QNTPD2SK6UL32EVQHMZP6BUUD/"},{"reference_url":"https://www.exploit-db.com/exploits/44652/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44652/"},{"reference_url":"https://www.exploit-db.com/exploits/44890/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44890/"},{"reference_url":"https://www.tenable.com/security/tns-2018-10","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2018-10"},{"reference_url":"http://www.securityfocus.com/bid/104195","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104195"},{"reference_url":"http://www.securitytracker.com/id/1040912","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040912"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1567974","reference_id":"1567974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1567974"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:enterprise_virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://github.com/kkirsche/CVE-2018-1111/blob/e889762d796a8a2a8cb574b173e6cb215befac1a/main.py","reference_id":"CVE-2018-1111","reference_type":"exploit","scores":[],"url":"https://github.com/kkirsche/CVE-2018-1111/blob/e889762d796a8a2a8cb574b173e6cb215befac1a/main.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44652.py","reference_id":"CVE-2018-1111","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44652.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44890.rb","reference_id":"CVE-2018-1111","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44890.rb"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1111","reference_id":"CVE-2018-1111","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1111"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/c3c6bc19da7d63c5fd3f6d87fee058ce4b4e8b8f/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb","reference_id":"CVE-2018-1111","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/c3c6bc19da7d63c5fd3f6d87fee058ce4b4e8b8f/modules/exploits/unix/dhcp/rhel_dhcp_client_command_injection.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1453","reference_id":"RHSA-2018:1453","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1454","reference_id":"RHSA-2018:1454","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1455","reference_id":"RHSA-2018:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1456","reference_id":"RHSA-2018:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1456"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1457","reference_id":"RHSA-2018:1457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1458","reference_id":"RHSA-2018:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1459","reference_id":"RHSA-2018:1459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1460","reference_id":"RHSA-2018:1460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1461","reference_id":"RHSA-2018:1461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1524","reference_id":"RHSA-2018:1524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1524"}],"fixed_packages":[],"aliases":["CVE-2018-1111"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r42j-jg5s-auda"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/imgbased@1.0.16-0.1%3Farch=el7ev"}