{"url":"http://public2.vulnerablecode.io/api/packages/84255?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p11","type":"ebuild","namespace":"net-misc","name":"ntp","version":"4.2.8_p11","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.2.8_p13","latest_non_vulnerable_version":"4.2.8_p16","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58489?format=json","vulnerability_id":"VCID-2536-ky83-bfec","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7170.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7170.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7170","reference_id":"","reference_type":"","scores":[{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67591","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67594","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67567","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67438","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67459","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.6749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.6748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67516","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67529","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67508","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67538","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67513","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00536","scoring_system":"epss","scoring_elements":"0.67556","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550214","reference_id":"1550214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550214"},{"reference_url":"https://security.archlinux.org/ASA-201803-11","reference_id":"ASA-201803-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-11"},{"reference_url":"https://security.archlinux.org/AVG-647","reference_id":"AVG-647","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-647"},{"reference_url":"https://security.gentoo.org/glsa/201805-12","reference_id":"GLSA-201805-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201805-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84255?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p11"}],"aliases":["CVE-2018-7170"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2536-ky83-bfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58491?format=json","vulnerability_id":"VCID-8gnm-nqcy-87b3","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7182.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7182","reference_id":"","reference_type":"","scores":[{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93519","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93451","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.9347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93488","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93502","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11077","scoring_system":"epss","scoring_elements":"0.93513","published_at":"2026-05-11T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94395","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94392","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94378","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14259","scoring_system":"epss","scoring_elements":"0.94388","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550208","reference_id":"1550208","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550208"},{"reference_url":"https://security.archlinux.org/ASA-201803-11","reference_id":"ASA-201803-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-11"},{"reference_url":"https://security.archlinux.org/AVG-647","reference_id":"AVG-647","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-647"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45846.py","reference_id":"CVE-2018-7182","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/45846.py"},{"reference_url":"https://security.gentoo.org/glsa/201805-12","reference_id":"GLSA-201805-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201805-12"},{"reference_url":"https://usn.ubuntu.com/3707-1/","reference_id":"USN-3707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3707-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84255?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p11"}],"aliases":["CVE-2018-7182"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8gnm-nqcy-87b3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58495?format=json","vulnerability_id":"VCID-ffw3-6y9s-wycc","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7184.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7184.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7184","reference_id":"","reference_type":"","scores":[{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.9418","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94171","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94176","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.9411","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94119","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94136","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.9414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94142","published_at":"2026-04-24T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13128","scoring_system":"epss","scoring_elements":"0.94159","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7184"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550218","reference_id":"1550218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550218"},{"reference_url":"https://security.archlinux.org/ASA-201803-11","reference_id":"ASA-201803-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-11"},{"reference_url":"https://security.archlinux.org/AVG-647","reference_id":"AVG-647","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-647"},{"reference_url":"https://security.gentoo.org/glsa/201805-12","reference_id":"GLSA-201805-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201805-12"},{"reference_url":"https://usn.ubuntu.com/3707-1/","reference_id":"USN-3707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3707-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84255?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p11"}],"aliases":["CVE-2018-7184"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffw3-6y9s-wycc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58493?format=json","vulnerability_id":"VCID-uazs-na27-xqaz","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7183.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7183","reference_id":"","reference_type":"","scores":[{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.96268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.96304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.96275","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.96283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.96288","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2629","scoring_system":"epss","scoring_elements":"0.96297","published_at":"2026-04-08T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96861","published_at":"2026-05-12T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96853","published_at":"2026-05-09T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96855","published_at":"2026-05-11T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96824","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.9683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96832","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96835","published_at":"2026-04-29T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96843","published_at":"2026-05-05T12:55:00Z"},{"value":"0.32035","scoring_system":"epss","scoring_elements":"0.96847","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7183"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550223","reference_id":"1550223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550223"},{"reference_url":"https://security.archlinux.org/ASA-201803-11","reference_id":"ASA-201803-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-11"},{"reference_url":"https://security.archlinux.org/AVG-647","reference_id":"AVG-647","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-647"},{"reference_url":"https://security.gentoo.org/glsa/201805-12","reference_id":"GLSA-201805-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201805-12"},{"reference_url":"https://usn.ubuntu.com/3707-1/","reference_id":"USN-3707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3707-1/"},{"reference_url":"https://usn.ubuntu.com/3707-2/","reference_id":"USN-3707-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3707-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84255?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p11"}],"aliases":["CVE-2018-7183"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uazs-na27-xqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58497?format=json","vulnerability_id":"VCID-vsbt-fd9b-bqbh","summary":"Multiple vulnerabilities have been found in NTP, the worst of which\n    could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7185.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7185","reference_id":"","reference_type":"","scores":[{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86501","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86492","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86489","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86375","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86397","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86407","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86436","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86432","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86453","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0292","scoring_system":"epss","scoring_elements":"0.86472","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550220","reference_id":"1550220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1550220"},{"reference_url":"https://security.archlinux.org/ASA-201803-11","reference_id":"ASA-201803-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-11"},{"reference_url":"https://security.archlinux.org/AVG-647","reference_id":"AVG-647","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-647"},{"reference_url":"https://security.gentoo.org/glsa/201805-12","reference_id":"GLSA-201805-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201805-12"},{"reference_url":"https://usn.ubuntu.com/3707-1/","reference_id":"USN-3707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3707-1/"},{"reference_url":"https://usn.ubuntu.com/3707-2/","reference_id":"USN-3707-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3707-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84255?format=json","purl":"pkg:ebuild/net-misc/ntp@4.2.8_p11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p11"}],"aliases":["CVE-2018-7185"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vsbt-fd9b-bqbh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/ntp@4.2.8_p11"}