Matthijs Kooijman discovered that Paramiko's SSH server implementation did not properly require authentication before processing requests. An unauthenticated remote attacker could possibly use this to execute arbitrary code.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.10.1-1git1ubuntu0.1",
            "binary_name": "python-paramiko"
        }
    ]
}
          {
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2018-7750"
        }
    ]
}
                {
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "1.16.0-1ubuntu0.1",
            "binary_name": "python-paramiko"
        },
        {
            "binary_version": "1.16.0-1ubuntu0.1",
            "binary_name": "python3-paramiko"
        }
    ]
}
          {
    "ecosystem": "Ubuntu:16.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ],
            "id": "CVE-2018-7750"
        }
    ]
}