Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/371411?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "type": "alpm", "namespace": "archlinux", "name": "gitlab", "version": "11.4.3-1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "11.4.3-2", "latest_non_vulnerable_version": "15.2.1-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180209?format=api", "vulnerability_id": "VCID-237a-hwkp-47ep", "summary": "An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Information Exposure Through an Error Message.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28272", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28773", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28853", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28903", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.2871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28776", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28816", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28775", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28726", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28745", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28674", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28559", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28448", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28373", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00106", "scoring_system": "epss", "scoring_elements": "0.28215", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18648" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18648" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-237a-hwkp-47ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180204?format=api", "vulnerability_id": "VCID-4nq8-46us-fqdx", "summary": "GitLab CE & EE 11.2 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 have Persistent XSS.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26376", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26746", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26832", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26733", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26737", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26636", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26643", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26615", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26518", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26307", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18643" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18643" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4nq8-46us-fqdx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180207?format=api", "vulnerability_id": "VCID-818r-vkyn-dfg3", "summary": "An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It allows SSRF.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45238", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.4533", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45405", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45425", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45369", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45447", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45417", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45277", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00226", "scoring_system": "epss", "scoring_elements": "0.45174", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18646" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18646" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-818r-vkyn-dfg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180206?format=api", "vulnerability_id": "VCID-b892-qn91-h7aa", "summary": "An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It allows for Information Exposure via unsubscribe links in email replies.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26436", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.2681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26893", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26678", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26746", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26797", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.268", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26755", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26707", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26637", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26581", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26501", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26367", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18645" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18645" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b892-qn91-h7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180210?format=api", "vulnerability_id": "VCID-j3h8-a8dz-nbc3", "summary": "An issue was discovered in the wiki API in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It allows for remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18649", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98066", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98034", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.9804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98048", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98054", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98055", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98061", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98062", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98058", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98057", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.54969", "scoring_system": "epss", "scoring_elements": "0.98068", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18649" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18649" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j3h8-a8dz-nbc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180201?format=api", "vulnerability_id": "VCID-pkf7-7s21-17a8", "summary": "An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Information Exposure Through Browser Caching.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29174", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29667", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29735", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.296", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.297", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29702", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29658", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29556", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.2944", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29326", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29115", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18640" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18640" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkf7-7s21-17a8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/180202?format=api", "vulnerability_id": "VCID-vybv-n2a8-qugs", "summary": "An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Cleartext Storage of Sensitive Information.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18901", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19187", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19374", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19089", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1917", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19085", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19104", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18995", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18982", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18938", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18816", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18641" }, { "reference_url": "https://security.archlinux.org/ASA-201810-16", "reference_id": "ASA-201810-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201810-16" }, { "reference_url": "https://security.archlinux.org/AVG-794", "reference_id": "AVG-794", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371411?format=api", "purl": "pkg:alpm/archlinux/gitlab@11.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" } ], "aliases": [ "CVE-2018-18641" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vybv-n2a8-qugs" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@11.4.3-1" }