cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2018-1127,https://securityvulnerability.io/vulnerability/CVE-2018-1127,,Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.,Red Hat,Red Hat Gluster Storage,4.2,MEDIUM,0.0023399998899549246,false,false,false,false,,false,false,2018-09-11T15:00:00.000Z,0 CVE-2017-15085,https://securityvulnerability.io/vulnerability/CVE-2017-15085,,It was discovered that the fix for CVE-2017-12150 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.,Red Hat,Gluster Storage For Rhel 6,5.9,MEDIUM,0.0016299999551847577,false,false,false,false,,false,false,2017-11-08T19:00:00.000Z,0 CVE-2017-15086,https://securityvulnerability.io/vulnerability/CVE-2017-15086,,It was discovered that the fix for CVE-2017-12151 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.,Red Hat,Gluster Storage For Rhel 6,7.4,HIGH,0.0019600000232458115,false,false,false,false,,false,false,2017-11-08T19:00:00.000Z,0 CVE-2017-15087,https://securityvulnerability.io/vulnerability/CVE-2017-15087,,It was discovered that the fix for CVE-2017-12163 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.,Red Hat,Gluster Storage For Rhel 6,7.5,HIGH,0.0016299999551847577,false,false,false,false,,false,false,2017-11-08T19:00:00.000Z,0