Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ceph@0.80.7-1~bpo70%2B1
Typedeb
Namespacedebian
Nameceph
Version0.80.7-1~bpo70+1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version18.2.8+ds-1
Latest_non_vulnerable_version18.2.8+ds-1
Affected_by_vulnerabilities
0
url VCID-18bk-met9-qfc9
vulnerability_id VCID-18bk-met9-qfc9
summary pybind: Improper use of Pybind
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31884.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31884.json
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31884
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126573
reference_id 1126573
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126573
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2389907
reference_id 2389907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2389907
5
reference_url https://access.redhat.com/errata/RHSA-2026:2711
reference_id RHSA-2026:2711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2711
6
reference_url https://access.redhat.com/errata/RHSA-2026:2737
reference_id RHSA-2026:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2737
7
reference_url https://access.redhat.com/errata/RHSA-2026:2800
reference_id RHSA-2026:2800
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2800
8
reference_url https://usn.ubuntu.com/8045-1/
reference_id USN-8045-1
reference_type
scores
url https://usn.ubuntu.com/8045-1/
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
1
url pkg:deb/debian/ceph@18.2.8%2Bds-1
purl pkg:deb/debian/ceph@18.2.8%2Bds-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1
aliases CVE-2024-31884
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18bk-met9-qfc9
1
url VCID-1fhp-86sm-bqe5
vulnerability_id VCID-1fhp-86sm-bqe5
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25660.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25660
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50751
published_at 2026-04-01T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50807
published_at 2026-04-02T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50833
published_at 2026-04-04T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50791
published_at 2026-04-07T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50848
published_at 2026-04-08T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50846
published_at 2026-04-09T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50888
published_at 2026-04-11T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50865
published_at 2026-04-12T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.5085
published_at 2026-04-13T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50887
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890354
reference_id 1890354
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890354
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975275
reference_id 975275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975275
6
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:5325
reference_id RHSA-2020:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5325
8
reference_url https://access.redhat.com/errata/RHSA-2021:0081
reference_id RHSA-2021:0081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0081
9
reference_url https://usn.ubuntu.com/4706-1/
reference_id USN-4706-1
reference_type
scores
url https://usn.ubuntu.com/4706-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-25660
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fhp-86sm-bqe5
2
url VCID-1yz5-m9s7-nqdm
vulnerability_id VCID-1yz5-m9s7-nqdm
summary rgw: RGW DoS attack with empty HTTP header in S3 object copy
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47866.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47866
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40532
published_at 2026-04-16T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40541
published_at 2026-04-11T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40504
published_at 2026-04-12T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40484
published_at 2026-04-13T12:55:00Z
4
value 0.00194
scoring_system epss
scoring_elements 0.41399
published_at 2026-04-09T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43591
published_at 2026-04-07T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43642
published_at 2026-04-08T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43654
published_at 2026-04-04T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.43629
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120797
reference_id 1120797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120797
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392386
reference_id 2392386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2392386
6
reference_url https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8
reference_id GHSA-mgrm-g92q-f8h8
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-11T15:29:41Z/
url https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8
7
reference_url https://usn.ubuntu.com/8045-1/
reference_id USN-8045-1
reference_type
scores
url https://usn.ubuntu.com/8045-1/
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
1
url pkg:deb/debian/ceph@18.2.8%2Bds-1
purl pkg:deb/debian/ceph@18.2.8%2Bds-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1
aliases CVE-2024-47866
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1yz5-m9s7-nqdm
3
url VCID-36gd-352p-n7b7
vulnerability_id VCID-36gd-352p-n7b7
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20288.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20288
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41336
published_at 2026-04-01T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41428
published_at 2026-04-02T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.41457
published_at 2026-04-04T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41384
published_at 2026-04-07T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41434
published_at 2026-04-08T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41442
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.41463
published_at 2026-04-11T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.41431
published_at 2026-04-12T12:55:00Z
8
value 0.00195
scoring_system epss
scoring_elements 0.41416
published_at 2026-04-13T12:55:00Z
9
value 0.00195
scoring_system epss
scoring_elements 0.41459
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20288
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1938031
reference_id 1938031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1938031
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986974
reference_id 986974
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986974
6
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
7
reference_url https://access.redhat.com/errata/RHSA-2021:2445
reference_id RHSA-2021:2445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2445
8
reference_url https://access.redhat.com/errata/RHSA-2022:1394
reference_id RHSA-2022:1394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1394
9
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
10
reference_url https://usn.ubuntu.com/5128-1/
reference_id USN-5128-1
reference_type
scores
url https://usn.ubuntu.com/5128-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2021-20288
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36gd-352p-n7b7
4
url VCID-3pwt-4j1y-dbg6
vulnerability_id VCID-3pwt-4j1y-dbg6
summary ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10222.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10222
reference_id
reference_type
scores
0
value 0.02086
scoring_system epss
scoring_elements 0.83945
published_at 2026-04-01T12:55:00Z
1
value 0.02086
scoring_system epss
scoring_elements 0.84037
published_at 2026-04-16T12:55:00Z
2
value 0.02086
scoring_system epss
scoring_elements 0.84007
published_at 2026-04-09T12:55:00Z
3
value 0.02086
scoring_system epss
scoring_elements 0.84023
published_at 2026-04-11T12:55:00Z
4
value 0.02086
scoring_system epss
scoring_elements 0.84017
published_at 2026-04-12T12:55:00Z
5
value 0.02086
scoring_system epss
scoring_elements 0.84012
published_at 2026-04-13T12:55:00Z
6
value 0.02086
scoring_system epss
scoring_elements 0.83959
published_at 2026-04-02T12:55:00Z
7
value 0.02086
scoring_system epss
scoring_elements 0.83974
published_at 2026-04-04T12:55:00Z
8
value 0.02086
scoring_system epss
scoring_elements 0.83978
published_at 2026-04-07T12:55:00Z
9
value 0.02086
scoring_system epss
scoring_elements 0.84001
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10222
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10222
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html
6
reference_url https://tracker.ceph.com/issues/40018
reference_id
reference_type
scores
url https://tracker.ceph.com/issues/40018
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1739292
reference_id 1739292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1739292
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936015
reference_id 936015
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936015
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10222
reference_id CVE-2019-10222
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10222
15
reference_url https://access.redhat.com/errata/RHSA-2019:2577
reference_id RHSA-2019:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2577
16
reference_url https://access.redhat.com/errata/RHSA-2019:2579
reference_id RHSA-2019:2579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2579
17
reference_url https://usn.ubuntu.com/4112-1/
reference_id USN-4112-1
reference_type
scores
url https://usn.ubuntu.com/4112-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2019-10222
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3pwt-4j1y-dbg6
5
url VCID-47cr-h639-tqd4
vulnerability_id VCID-47cr-h639-tqd4
summary rgw: improperly verified POST keys
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43040.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43040.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43040
reference_id
reference_type
scores
0
value 0.06202
scoring_system epss
scoring_elements 0.90823
published_at 2026-04-02T12:55:00Z
1
value 0.06202
scoring_system epss
scoring_elements 0.90893
published_at 2026-04-16T12:55:00Z
2
value 0.06202
scoring_system epss
scoring_elements 0.90844
published_at 2026-04-07T12:55:00Z
3
value 0.06202
scoring_system epss
scoring_elements 0.90855
published_at 2026-04-08T12:55:00Z
4
value 0.06202
scoring_system epss
scoring_elements 0.90862
published_at 2026-04-09T12:55:00Z
5
value 0.06202
scoring_system epss
scoring_elements 0.9087
published_at 2026-04-12T12:55:00Z
6
value 0.06202
scoring_system epss
scoring_elements 0.90868
published_at 2026-04-13T12:55:00Z
7
value 0.06202
scoring_system epss
scoring_elements 0.90833
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43040
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053690
reference_id 1053690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053690
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2216855
reference_id 2216855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2216855
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/266807
reference_id 266807
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:41:59Z/
url https://exchange.xforce.ibmcloud.com/vulnerabilities/266807
7
reference_url https://www.ibm.com/support/pages/node/7151040
reference_id 7151040
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:41:59Z/
url https://www.ibm.com/support/pages/node/7151040
8
reference_url https://access.redhat.com/errata/RHSA-2023:5693
reference_id RHSA-2023:5693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5693
9
reference_url https://access.redhat.com/errata/RHSA-2024:0745
reference_id RHSA-2024:0745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0745
10
reference_url https://usn.ubuntu.com/6613-1/
reference_id USN-6613-1
reference_type
scores
url https://usn.ubuntu.com/6613-1/
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
aliases CVE-2023-43040
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47cr-h639-tqd4
6
url VCID-4mk7-e67u-zkgy
vulnerability_id VCID-4mk7-e67u-zkgy
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27781.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27781
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21906
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21959
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21725
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21802
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21858
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21869
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.2183
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21771
published_at 2026-04-13T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21773
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1900109
reference_id 1900109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1900109
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670
reference_id 985670
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670
6
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
7
reference_url https://access.redhat.com/errata/RHSA-2021:0081
reference_id RHSA-2021:0081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0081
8
reference_url https://access.redhat.com/errata/RHSA-2021:1518
reference_id RHSA-2021:1518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1518
9
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
10
reference_url https://usn.ubuntu.com/5128-1/
reference_id USN-5128-1
reference_type
scores
url https://usn.ubuntu.com/5128-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-27781
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk7-e67u-zkgy
7
url VCID-54nw-yq6d-2ueu
vulnerability_id VCID-54nw-yq6d-2ueu
summary A vulnerability has been found in Ceph which can lead to root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3650.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3650.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3650
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07083
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07132
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07108
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07161
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07193
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0719
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07179
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07171
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07106
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3650
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3650
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024932
reference_id 1024932
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024932
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2136909
reference_id 2136909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2136909
6
reference_url https://security.gentoo.org/glsa/202312-10
reference_id GLSA-202312-10
reference_type
scores
url https://security.gentoo.org/glsa/202312-10
7
reference_url https://access.redhat.com/errata/RHSA-2023:0980
reference_id RHSA-2023:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0980
8
reference_url https://usn.ubuntu.com/6063-1/
reference_id USN-6063-1
reference_type
scores
url https://usn.ubuntu.com/6063-1/
9
reference_url https://usn.ubuntu.com/6292-1/
reference_id USN-6292-1
reference_type
scores
url https://usn.ubuntu.com/6292-1/
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
aliases CVE-2022-3650
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54nw-yq6d-2ueu
8
url VCID-5bgn-2pbq-6yd1
vulnerability_id VCID-5bgn-2pbq-6yd1
summary ceph: user/tenant can obtain access (read/write) to any share
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0670.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0670
reference_id
reference_type
scores
0
value 0.00196
scoring_system epss
scoring_elements 0.41515
published_at 2026-04-01T12:55:00Z
1
value 0.00196
scoring_system epss
scoring_elements 0.41604
published_at 2026-04-02T12:55:00Z
2
value 0.00196
scoring_system epss
scoring_elements 0.41632
published_at 2026-04-04T12:55:00Z
3
value 0.00196
scoring_system epss
scoring_elements 0.41559
published_at 2026-04-07T12:55:00Z
4
value 0.00196
scoring_system epss
scoring_elements 0.41609
published_at 2026-04-08T12:55:00Z
5
value 0.00196
scoring_system epss
scoring_elements 0.41607
published_at 2026-04-12T12:55:00Z
6
value 0.00196
scoring_system epss
scoring_elements 0.41594
published_at 2026-04-13T12:55:00Z
7
value 0.00196
scoring_system epss
scoring_elements 0.41618
published_at 2026-04-09T12:55:00Z
8
value 0.00196
scoring_system epss
scoring_elements 0.4164
published_at 2026-04-11T12:55:00Z
9
value 0.00223
scoring_system epss
scoring_elements 0.44967
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0670
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0670
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016069
reference_id 1016069
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016069
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050728
reference_id 2050728
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050728
6
reference_url https://access.redhat.com/errata/RHSA-2022:5997
reference_id RHSA-2022:5997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5997
7
reference_url https://usn.ubuntu.com/6063-1/
reference_id USN-6063-1
reference_type
scores
url https://usn.ubuntu.com/6063-1/
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
aliases CVE-2022-0670
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bgn-2pbq-6yd1
9
url VCID-6kbn-psnc-q3cy
vulnerability_id VCID-6kbn-psnc-q3cy
summary ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12059.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12059.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-12059
reference_id
reference_type
scores
0
value 0.00284
scoring_system epss
scoring_elements 0.51733
published_at 2026-04-01T12:55:00Z
1
value 0.00284
scoring_system epss
scoring_elements 0.51783
published_at 2026-04-02T12:55:00Z
2
value 0.00284
scoring_system epss
scoring_elements 0.51808
published_at 2026-04-04T12:55:00Z
3
value 0.00284
scoring_system epss
scoring_elements 0.51769
published_at 2026-04-07T12:55:00Z
4
value 0.00284
scoring_system epss
scoring_elements 0.51824
published_at 2026-04-08T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51821
published_at 2026-04-09T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51872
published_at 2026-04-11T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51852
published_at 2026-04-12T12:55:00Z
8
value 0.00284
scoring_system epss
scoring_elements 0.51837
published_at 2026-04-13T12:55:00Z
9
value 0.00284
scoring_system epss
scoring_elements 0.51879
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-12059
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12059
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1827262
reference_id 1827262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1827262
5
reference_url https://access.redhat.com/errata/RHSA-2021:1518
reference_id RHSA-2021:1518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1518
6
reference_url https://usn.ubuntu.com/4528-1/
reference_id USN-4528-1
reference_type
scores
url https://usn.ubuntu.com/4528-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-12059
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6kbn-psnc-q3cy
10
url VCID-7k2s-fmzx-a3d8
vulnerability_id VCID-7k2s-fmzx-a3d8
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25678.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25678.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25678
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02843
published_at 2026-04-01T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02909
published_at 2026-04-02T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02924
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02931
published_at 2026-04-07T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02933
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02958
published_at 2026-04-09T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02928
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02908
published_at 2026-04-12T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02901
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04957
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25678
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1892109
reference_id 1892109
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1892109
4
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
5
reference_url https://access.redhat.com/errata/RHSA-2021:1452
reference_id RHSA-2021:1452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1452
6
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-25678
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7k2s-fmzx-a3d8
11
url VCID-9e77-3unf-r3hu
vulnerability_id VCID-9e77-3unf-r3hu
summary ceph-dashboard: Cross-site scripting via token Cookie
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3509.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3509
reference_id
reference_type
scores
0
value 0.00597
scoring_system epss
scoring_elements 0.69311
published_at 2026-04-01T12:55:00Z
1
value 0.00597
scoring_system epss
scoring_elements 0.69323
published_at 2026-04-02T12:55:00Z
2
value 0.00597
scoring_system epss
scoring_elements 0.6934
published_at 2026-04-04T12:55:00Z
3
value 0.00597
scoring_system epss
scoring_elements 0.6932
published_at 2026-04-07T12:55:00Z
4
value 0.00597
scoring_system epss
scoring_elements 0.6937
published_at 2026-04-08T12:55:00Z
5
value 0.00597
scoring_system epss
scoring_elements 0.69386
published_at 2026-04-09T12:55:00Z
6
value 0.00597
scoring_system epss
scoring_elements 0.69408
published_at 2026-04-11T12:55:00Z
7
value 0.00597
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-12T12:55:00Z
8
value 0.00597
scoring_system epss
scoring_elements 0.69379
published_at 2026-04-13T12:55:00Z
9
value 0.00597
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3509
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1950116
reference_id 1950116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1950116
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988888
reference_id 988888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988888
6
reference_url https://access.redhat.com/errata/RHSA-2021:2445
reference_id RHSA-2021:2445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2445
7
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
8
reference_url https://usn.ubuntu.com/5128-1/
reference_id USN-5128-1
reference_type
scores
url https://usn.ubuntu.com/5128-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2021-3509
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9e77-3unf-r3hu
12
url VCID-a4u3-63ez-gfbc
vulnerability_id VCID-a4u3-63ez-gfbc
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10753.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10753
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61026
published_at 2026-04-01T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.61103
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61131
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61097
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61145
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.6116
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61181
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61168
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61148
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61189
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1840744
reference_id 1840744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1840744
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300
reference_id 975300
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300
6
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:3003
reference_id RHSA-2020:3003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3003
8
reference_url https://access.redhat.com/errata/RHSA-2020:3504
reference_id RHSA-2020:3504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3504
9
reference_url https://access.redhat.com/errata/RHSA-2020:3505
reference_id RHSA-2020:3505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3505
10
reference_url https://usn.ubuntu.com/4528-1/
reference_id USN-4528-1
reference_type
scores
url https://usn.ubuntu.com/4528-1/
11
reference_url https://usn.ubuntu.com/4706-1/
reference_id USN-4706-1
reference_type
scores
url https://usn.ubuntu.com/4706-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-10753
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4u3-63ez-gfbc
13
url VCID-axaa-8h31-j3gd
vulnerability_id VCID-axaa-8h31-j3gd
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
1
reference_url http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1129.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1129.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1129
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55853
published_at 2026-04-16T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55816
published_at 2026-04-13T12:55:00Z
2
value 0.00404
scoring_system epss
scoring_elements 0.60944
published_at 2026-04-12T12:55:00Z
3
value 0.00404
scoring_system epss
scoring_elements 0.60805
published_at 2026-04-01T12:55:00Z
4
value 0.00404
scoring_system epss
scoring_elements 0.60878
published_at 2026-04-02T12:55:00Z
5
value 0.00404
scoring_system epss
scoring_elements 0.60907
published_at 2026-04-04T12:55:00Z
6
value 0.00404
scoring_system epss
scoring_elements 0.60871
published_at 2026-04-07T12:55:00Z
7
value 0.00404
scoring_system epss
scoring_elements 0.6092
published_at 2026-04-08T12:55:00Z
8
value 0.00404
scoring_system epss
scoring_elements 0.60937
published_at 2026-04-09T12:55:00Z
9
value 0.00404
scoring_system epss
scoring_elements 0.60958
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
reference_id
reference_type
scores
url https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
10
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
11
reference_url https://www.debian.org/security/2018/dsa-4339
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4339
12
reference_url http://tracker.ceph.com/issues/24837
reference_id
reference_type
scores
url http://tracker.ceph.com/issues/24837
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1576057
reference_id 1576057
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1576057
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913472
reference_id 913472
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913472
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1129
reference_id CVE-2018-1129
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-1129
51
reference_url https://access.redhat.com/errata/RHSA-2018:2177
reference_id RHSA-2018:2177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2177
52
reference_url https://access.redhat.com/errata/RHSA-2018:2179
reference_id RHSA-2018:2179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2179
53
reference_url https://access.redhat.com/errata/RHSA-2018:2261
reference_id RHSA-2018:2261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2261
54
reference_url https://access.redhat.com/errata/RHSA-2018:2274
reference_id RHSA-2018:2274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2274
fixed_packages
0
url pkg:deb/debian/ceph@10.2.11-2
purl pkg:deb/debian/ceph@10.2.11-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-kxvn-yjm8-3ygt
19
vulnerability VCID-m5wq-1w2k-9khk
20
vulnerability VCID-nczx-qfyh-xubz
21
vulnerability VCID-pp2v-1dp5-4bbd
22
vulnerability VCID-qkp7-s947-ufcu
23
vulnerability VCID-r1ah-c6z7-vyen
24
vulnerability VCID-rukb-cwpx-q3hy
25
vulnerability VCID-ssk3-kfn8-vuhy
26
vulnerability VCID-xsvh-emr7-r7as
27
vulnerability VCID-yr1z-udw9-mfha
28
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.11-2
1
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2018-1129
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-axaa-8h31-j3gd
14
url VCID-bdcb-c7nj-j7gw
vulnerability_id VCID-bdcb-c7nj-j7gw
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10861.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10861.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10861
reference_id
reference_type
scores
0
value 0.0058
scoring_system epss
scoring_elements 0.68813
published_at 2026-04-01T12:55:00Z
1
value 0.0058
scoring_system epss
scoring_elements 0.68922
published_at 2026-04-16T12:55:00Z
2
value 0.0058
scoring_system epss
scoring_elements 0.68924
published_at 2026-04-11T12:55:00Z
3
value 0.0058
scoring_system epss
scoring_elements 0.6891
published_at 2026-04-12T12:55:00Z
4
value 0.0058
scoring_system epss
scoring_elements 0.68881
published_at 2026-04-13T12:55:00Z
5
value 0.0058
scoring_system epss
scoring_elements 0.68831
published_at 2026-04-02T12:55:00Z
6
value 0.0058
scoring_system epss
scoring_elements 0.68852
published_at 2026-04-04T12:55:00Z
7
value 0.0058
scoring_system epss
scoring_elements 0.68832
published_at 2026-04-07T12:55:00Z
8
value 0.0058
scoring_system epss
scoring_elements 0.68882
published_at 2026-04-08T12:55:00Z
9
value 0.0058
scoring_system epss
scoring_elements 0.68901
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10861
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
reference_id
reference_type
scores
url https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
9
reference_url https://www.debian.org/security/2018/dsa-4339
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4339
10
reference_url http://tracker.ceph.com/issues/24838
reference_id
reference_type
scores
url http://tracker.ceph.com/issues/24838
11
reference_url http://www.securityfocus.com/bid/104742
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104742
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1593308
reference_id 1593308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1593308
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913470
reference_id 913470
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913470
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10861
reference_id CVE-2018-10861
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10861
47
reference_url https://access.redhat.com/errata/RHSA-2018:2177
reference_id RHSA-2018:2177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2177
48
reference_url https://access.redhat.com/errata/RHSA-2018:2179
reference_id RHSA-2018:2179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2179
49
reference_url https://access.redhat.com/errata/RHSA-2018:2261
reference_id RHSA-2018:2261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2261
50
reference_url https://access.redhat.com/errata/RHSA-2018:2274
reference_id RHSA-2018:2274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2274
fixed_packages
0
url pkg:deb/debian/ceph@10.2.11-2
purl pkg:deb/debian/ceph@10.2.11-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-kxvn-yjm8-3ygt
19
vulnerability VCID-m5wq-1w2k-9khk
20
vulnerability VCID-nczx-qfyh-xubz
21
vulnerability VCID-pp2v-1dp5-4bbd
22
vulnerability VCID-qkp7-s947-ufcu
23
vulnerability VCID-r1ah-c6z7-vyen
24
vulnerability VCID-rukb-cwpx-q3hy
25
vulnerability VCID-ssk3-kfn8-vuhy
26
vulnerability VCID-xsvh-emr7-r7as
27
vulnerability VCID-yr1z-udw9-mfha
28
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.11-2
1
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2018-10861
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdcb-c7nj-j7gw
15
url VCID-bysx-t7fz-5kdk
vulnerability_id VCID-bysx-t7fz-5kdk
summary Ceph: RGW returns requested bucket name raw in Bucket response header
references
0
reference_url http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html
reference_id
reference_type
scores
url http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5245.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5245.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5245
reference_id
reference_type
scores
0
value 0.00361
scoring_system epss
scoring_elements 0.58278
published_at 2026-04-16T12:55:00Z
1
value 0.00361
scoring_system epss
scoring_elements 0.58132
published_at 2026-04-01T12:55:00Z
2
value 0.00361
scoring_system epss
scoring_elements 0.58218
published_at 2026-04-02T12:55:00Z
3
value 0.00361
scoring_system epss
scoring_elements 0.58238
published_at 2026-04-04T12:55:00Z
4
value 0.00361
scoring_system epss
scoring_elements 0.58213
published_at 2026-04-07T12:55:00Z
5
value 0.00361
scoring_system epss
scoring_elements 0.58267
published_at 2026-04-12T12:55:00Z
6
value 0.00361
scoring_system epss
scoring_elements 0.58272
published_at 2026-04-09T12:55:00Z
7
value 0.00361
scoring_system epss
scoring_elements 0.5829
published_at 2026-04-11T12:55:00Z
8
value 0.00361
scoring_system epss
scoring_elements 0.58246
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5245
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5245
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5245
4
reference_url http://tracker.ceph.com/issues/12537
reference_id
reference_type
scores
url http://tracker.ceph.com/issues/12537
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261606
reference_id 1261606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261606
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798567
reference_id 798567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798567
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5245
reference_id CVE-2015-5245
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-5245
9
reference_url https://access.redhat.com/errata/RHSA-2015:2066
reference_id RHSA-2015:2066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2066
10
reference_url https://access.redhat.com/errata/RHSA-2015:2512
reference_id RHSA-2015:2512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2512
fixed_packages
0
url pkg:deb/debian/ceph@0.80.10-2~bpo8%2B1
purl pkg:deb/debian/ceph@0.80.10-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-cm58-jgsb-7yaf
16
vulnerability VCID-d8ft-cst1-5yh5
17
vulnerability VCID-fy1p-qh8k-m7b8
18
vulnerability VCID-gj55-s7r1-f3b4
19
vulnerability VCID-gjne-rqt9-jqc5
20
vulnerability VCID-hqp5-p9fs-t3dk
21
vulnerability VCID-kxvn-yjm8-3ygt
22
vulnerability VCID-m5wq-1w2k-9khk
23
vulnerability VCID-nczx-qfyh-xubz
24
vulnerability VCID-pp2v-1dp5-4bbd
25
vulnerability VCID-qkp7-s947-ufcu
26
vulnerability VCID-qr8p-ec3h-37at
27
vulnerability VCID-r1ah-c6z7-vyen
28
vulnerability VCID-rukb-cwpx-q3hy
29
vulnerability VCID-ss2f-8hxs-myb1
30
vulnerability VCID-ssk3-kfn8-vuhy
31
vulnerability VCID-xsvh-emr7-r7as
32
vulnerability VCID-yr1z-udw9-mfha
33
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0.80.10-2~bpo8%252B1
aliases CVE-2015-5245
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bysx-t7fz-5kdk
16
url VCID-cm58-jgsb-7yaf
vulnerability_id VCID-cm58-jgsb-7yaf
summary ceph: RGW permits bucket listing when authenticated_users=read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7031.json
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7031.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7031
reference_id
reference_type
scores
0
value 0.00743
scoring_system epss
scoring_elements 0.72952
published_at 2026-04-01T12:55:00Z
1
value 0.00743
scoring_system epss
scoring_elements 0.72964
published_at 2026-04-02T12:55:00Z
2
value 0.00743
scoring_system epss
scoring_elements 0.72983
published_at 2026-04-04T12:55:00Z
3
value 0.00743
scoring_system epss
scoring_elements 0.72959
published_at 2026-04-07T12:55:00Z
4
value 0.00743
scoring_system epss
scoring_elements 0.72996
published_at 2026-04-08T12:55:00Z
5
value 0.00743
scoring_system epss
scoring_elements 0.7301
published_at 2026-04-09T12:55:00Z
6
value 0.00743
scoring_system epss
scoring_elements 0.73035
published_at 2026-04-11T12:55:00Z
7
value 0.00743
scoring_system epss
scoring_elements 0.73014
published_at 2026-04-12T12:55:00Z
8
value 0.00743
scoring_system epss
scoring_elements 0.73007
published_at 2026-04-13T12:55:00Z
9
value 0.00743
scoring_system epss
scoring_elements 0.73049
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7031
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7031
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1372446
reference_id 1372446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1372446
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838026
reference_id 838026
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838026
6
reference_url https://access.redhat.com/errata/RHSA-2016:1972
reference_id RHSA-2016:1972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1972
7
reference_url https://access.redhat.com/errata/RHSA-2016:1973
reference_id RHSA-2016:1973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1973
8
reference_url https://usn.ubuntu.com/3452-1/
reference_id USN-3452-1
reference_type
scores
url https://usn.ubuntu.com/3452-1/
fixed_packages
0
url pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
purl pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-hqp5-p9fs-t3dk
19
vulnerability VCID-kxvn-yjm8-3ygt
20
vulnerability VCID-m5wq-1w2k-9khk
21
vulnerability VCID-nczx-qfyh-xubz
22
vulnerability VCID-pp2v-1dp5-4bbd
23
vulnerability VCID-qkp7-s947-ufcu
24
vulnerability VCID-r1ah-c6z7-vyen
25
vulnerability VCID-rukb-cwpx-q3hy
26
vulnerability VCID-ssk3-kfn8-vuhy
27
vulnerability VCID-xsvh-emr7-r7as
28
vulnerability VCID-yr1z-udw9-mfha
29
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-6~bpo8%252B1
aliases CVE-2016-7031
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cm58-jgsb-7yaf
17
url VCID-d8ft-cst1-5yh5
vulnerability_id VCID-d8ft-cst1-5yh5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7519.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7519
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12924
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12777
published_at 2026-04-16T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1292
published_at 2026-04-12T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12876
published_at 2026-04-13T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-02T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.13066
published_at 2026-04-04T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12866
published_at 2026-04-07T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12944
published_at 2026-04-08T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12995
published_at 2026-04-09T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12956
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1460331
reference_id 1460331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1460331
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864535
reference_id 864535
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864535
fixed_packages
0
url pkg:deb/debian/ceph@10.2.11-2
purl pkg:deb/debian/ceph@10.2.11-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-kxvn-yjm8-3ygt
19
vulnerability VCID-m5wq-1w2k-9khk
20
vulnerability VCID-nczx-qfyh-xubz
21
vulnerability VCID-pp2v-1dp5-4bbd
22
vulnerability VCID-qkp7-s947-ufcu
23
vulnerability VCID-r1ah-c6z7-vyen
24
vulnerability VCID-rukb-cwpx-q3hy
25
vulnerability VCID-ssk3-kfn8-vuhy
26
vulnerability VCID-xsvh-emr7-r7as
27
vulnerability VCID-yr1z-udw9-mfha
28
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.11-2
1
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2017-7519
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8ft-cst1-5yh5
18
url VCID-fy1p-qh8k-m7b8
vulnerability_id VCID-fy1p-qh8k-m7b8
summary ceph: ListBucket max-keys has no defined limit in the RGW codebase
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16846.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16846.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16846
reference_id
reference_type
scores
0
value 0.04603
scoring_system epss
scoring_elements 0.89203
published_at 2026-04-01T12:55:00Z
1
value 0.04603
scoring_system epss
scoring_elements 0.89263
published_at 2026-04-16T12:55:00Z
2
value 0.04603
scoring_system epss
scoring_elements 0.89248
published_at 2026-04-09T12:55:00Z
3
value 0.04603
scoring_system epss
scoring_elements 0.89257
published_at 2026-04-11T12:55:00Z
4
value 0.04603
scoring_system epss
scoring_elements 0.89254
published_at 2026-04-12T12:55:00Z
5
value 0.04603
scoring_system epss
scoring_elements 0.8925
published_at 2026-04-13T12:55:00Z
6
value 0.04603
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-02T12:55:00Z
7
value 0.04603
scoring_system epss
scoring_elements 0.89223
published_at 2026-04-04T12:55:00Z
8
value 0.04603
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-07T12:55:00Z
9
value 0.04603
scoring_system epss
scoring_elements 0.89243
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16846
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846
4
reference_url https://ceph.com/releases/13-2-4-mimic-released/
reference_id
reference_type
scores
url https://ceph.com/releases/13-2-4-mimic-released/
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html
8
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1644461
reference_id 1644461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1644461
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921947
reference_id 921947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921947
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-16846
reference_id CVE-2018-16846
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-16846
22
reference_url https://access.redhat.com/errata/RHSA-2019:2538
reference_id RHSA-2019:2538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2538
23
reference_url https://access.redhat.com/errata/RHSA-2019:2541
reference_id RHSA-2019:2541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2541
24
reference_url https://usn.ubuntu.com/4035-1/
reference_id USN-4035-1
reference_type
scores
url https://usn.ubuntu.com/4035-1/
fixed_packages
0
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2018-16846
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fy1p-qh8k-m7b8
19
url VCID-gj55-s7r1-f3b4
vulnerability_id VCID-gj55-s7r1-f3b4
summary Ceph: RGW Denial of Service by sending null or specially crafted POST object requests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8626.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8626
reference_id
reference_type
scores
0
value 0.02873
scoring_system epss
scoring_elements 0.86211
published_at 2026-04-01T12:55:00Z
1
value 0.02873
scoring_system epss
scoring_elements 0.86293
published_at 2026-04-16T12:55:00Z
2
value 0.02873
scoring_system epss
scoring_elements 0.86281
published_at 2026-04-12T12:55:00Z
3
value 0.02873
scoring_system epss
scoring_elements 0.86277
published_at 2026-04-13T12:55:00Z
4
value 0.02873
scoring_system epss
scoring_elements 0.86221
published_at 2026-04-02T12:55:00Z
5
value 0.02873
scoring_system epss
scoring_elements 0.86238
published_at 2026-04-04T12:55:00Z
6
value 0.02873
scoring_system epss
scoring_elements 0.86239
published_at 2026-04-07T12:55:00Z
7
value 0.02873
scoring_system epss
scoring_elements 0.86258
published_at 2026-04-08T12:55:00Z
8
value 0.02873
scoring_system epss
scoring_elements 0.86269
published_at 2026-04-09T12:55:00Z
9
value 0.02873
scoring_system epss
scoring_elements 0.86283
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1389193
reference_id 1389193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1389193
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844200
reference_id 844200
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844200
6
reference_url https://access.redhat.com/errata/RHSA-2016:2815
reference_id RHSA-2016:2815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2815
7
reference_url https://access.redhat.com/errata/RHSA-2016:2816
reference_id RHSA-2016:2816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2816
8
reference_url https://access.redhat.com/errata/RHSA-2016:2847
reference_id RHSA-2016:2847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2847
9
reference_url https://access.redhat.com/errata/RHSA-2016:2848
reference_id RHSA-2016:2848
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2848
10
reference_url https://usn.ubuntu.com/3452-1/
reference_id USN-3452-1
reference_type
scores
url https://usn.ubuntu.com/3452-1/
fixed_packages
0
url pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
purl pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-hqp5-p9fs-t3dk
19
vulnerability VCID-kxvn-yjm8-3ygt
20
vulnerability VCID-m5wq-1w2k-9khk
21
vulnerability VCID-nczx-qfyh-xubz
22
vulnerability VCID-pp2v-1dp5-4bbd
23
vulnerability VCID-qkp7-s947-ufcu
24
vulnerability VCID-r1ah-c6z7-vyen
25
vulnerability VCID-rukb-cwpx-q3hy
26
vulnerability VCID-ssk3-kfn8-vuhy
27
vulnerability VCID-xsvh-emr7-r7as
28
vulnerability VCID-yr1z-udw9-mfha
29
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-6~bpo8%252B1
aliases CVE-2016-8626
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gj55-s7r1-f3b4
20
url VCID-gjne-rqt9-jqc5
vulnerability_id VCID-gjne-rqt9-jqc5
summary ceph: improper URL checking leads to information disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1699.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1699
reference_id
reference_type
scores
0
value 0.01822
scoring_system epss
scoring_elements 0.82808
published_at 2026-04-01T12:55:00Z
1
value 0.01822
scoring_system epss
scoring_elements 0.82824
published_at 2026-04-02T12:55:00Z
2
value 0.01822
scoring_system epss
scoring_elements 0.82838
published_at 2026-04-04T12:55:00Z
3
value 0.01822
scoring_system epss
scoring_elements 0.82834
published_at 2026-04-07T12:55:00Z
4
value 0.01822
scoring_system epss
scoring_elements 0.82859
published_at 2026-04-08T12:55:00Z
5
value 0.01822
scoring_system epss
scoring_elements 0.82866
published_at 2026-04-09T12:55:00Z
6
value 0.01822
scoring_system epss
scoring_elements 0.82881
published_at 2026-04-11T12:55:00Z
7
value 0.01822
scoring_system epss
scoring_elements 0.82876
published_at 2026-04-12T12:55:00Z
8
value 0.01822
scoring_system epss
scoring_elements 0.82872
published_at 2026-04-13T12:55:00Z
9
value 0.01822
scoring_system epss
scoring_elements 0.82911
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1699
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1792337
reference_id 1792337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1792337
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949206
reference_id 949206
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949206
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-1699
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjne-rqt9-jqc5
21
url VCID-hqp5-p9fs-t3dk
vulnerability_id VCID-hqp5-p9fs-t3dk
summary regression update
references
fixed_packages
0
url pkg:deb/debian/ceph@10.2.11-2
purl pkg:deb/debian/ceph@10.2.11-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-kxvn-yjm8-3ygt
19
vulnerability VCID-m5wq-1w2k-9khk
20
vulnerability VCID-nczx-qfyh-xubz
21
vulnerability VCID-pp2v-1dp5-4bbd
22
vulnerability VCID-qkp7-s947-ufcu
23
vulnerability VCID-r1ah-c6z7-vyen
24
vulnerability VCID-rukb-cwpx-q3hy
25
vulnerability VCID-ssk3-kfn8-vuhy
26
vulnerability VCID-xsvh-emr7-r7as
27
vulnerability VCID-yr1z-udw9-mfha
28
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.11-2
aliases DSA-4339-2 ceph
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hqp5-p9fs-t3dk
22
url VCID-kxvn-yjm8-3ygt
vulnerability_id VCID-kxvn-yjm8-3ygt
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1760.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1760
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57618
published_at 2026-04-01T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57703
published_at 2026-04-02T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57725
published_at 2026-04-04T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57699
published_at 2026-04-07T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.57754
published_at 2026-04-08T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57756
published_at 2026-04-09T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57772
published_at 2026-04-11T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57751
published_at 2026-04-12T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.57732
published_at 2026-04-13T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57761
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1812962
reference_id 1812962
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1812962
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956142
reference_id 956142
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956142
6
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
7
reference_url https://access.redhat.com/errata/RHSA-2020:3003
reference_id RHSA-2020:3003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3003
8
reference_url https://usn.ubuntu.com/4528-1/
reference_id USN-4528-1
reference_type
scores
url https://usn.ubuntu.com/4528-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-1760
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kxvn-yjm8-3ygt
23
url VCID-m5wq-1w2k-9khk
vulnerability_id VCID-m5wq-1w2k-9khk
summary ceph-dashboard: Don't use Browser's LocalStorage for storing JWT but Secure Cookies with proper HTTP Headers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27839.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27839
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56235
published_at 2026-04-01T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56345
published_at 2026-04-02T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56367
published_at 2026-04-04T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56349
published_at 2026-04-07T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.564
published_at 2026-04-08T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56405
published_at 2026-04-09T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56414
published_at 2026-04-11T12:55:00Z
7
value 0.00335
scoring_system epss
scoring_elements 0.5639
published_at 2026-04-12T12:55:00Z
8
value 0.00335
scoring_system epss
scoring_elements 0.56373
published_at 2026-04-13T12:55:00Z
9
value 0.00335
scoring_system epss
scoring_elements 0.56404
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901330
reference_id 1901330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901330
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670
reference_id 985670
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670
6
reference_url https://access.redhat.com/errata/RHSA-2021:2445
reference_id RHSA-2021:2445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2445
7
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-27839
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5wq-1w2k-9khk
24
url VCID-nczx-qfyh-xubz
vulnerability_id VCID-nczx-qfyh-xubz
summary ceph: Ceph volume does not honour osd_dmcrypt_key_size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3979.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3979.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3979
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50894
published_at 2026-04-01T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50947
published_at 2026-04-02T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50973
published_at 2026-04-04T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.5093
published_at 2026-04-07T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50987
published_at 2026-04-08T12:55:00Z
5
value 0.00275
scoring_system epss
scoring_elements 0.50985
published_at 2026-04-09T12:55:00Z
6
value 0.00275
scoring_system epss
scoring_elements 0.51027
published_at 2026-04-11T12:55:00Z
7
value 0.00275
scoring_system epss
scoring_elements 0.51006
published_at 2026-04-12T12:55:00Z
8
value 0.00275
scoring_system epss
scoring_elements 0.5099
published_at 2026-04-13T12:55:00Z
9
value 0.00275
scoring_system epss
scoring_elements 0.51028
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3979
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3979
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024788
reference_id 2024788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024788
5
reference_url https://access.redhat.com/errata/RHSA-2022:1174
reference_id RHSA-2022:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1174
6
reference_url https://usn.ubuntu.com/6063-1/
reference_id USN-6063-1
reference_type
scores
url https://usn.ubuntu.com/6063-1/
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
aliases CVE-2021-3979
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nczx-qfyh-xubz
25
url VCID-pp2v-1dp5-4bbd
vulnerability_id VCID-pp2v-1dp5-4bbd
summary ceph: connection leak in the RGW Beast front-end permits a DoS against the RGW server
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1700.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1700
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55484
published_at 2026-04-01T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55595
published_at 2026-04-02T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55619
published_at 2026-04-04T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.55596
published_at 2026-04-07T12:55:00Z
4
value 0.00326
scoring_system epss
scoring_elements 0.55648
published_at 2026-04-08T12:55:00Z
5
value 0.00326
scoring_system epss
scoring_elements 0.55651
published_at 2026-04-09T12:55:00Z
6
value 0.00326
scoring_system epss
scoring_elements 0.5566
published_at 2026-04-11T12:55:00Z
7
value 0.00326
scoring_system epss
scoring_elements 0.5564
published_at 2026-04-12T12:55:00Z
8
value 0.00326
scoring_system epss
scoring_elements 0.55623
published_at 2026-04-13T12:55:00Z
9
value 0.00326
scoring_system epss
scoring_elements 0.55661
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1700
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791691
reference_id 1791691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791691
5
reference_url https://usn.ubuntu.com/4304-1/
reference_id USN-4304-1
reference_type
scores
url https://usn.ubuntu.com/4304-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-1700
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pp2v-1dp5-4bbd
26
url VCID-qkp7-s947-ufcu
vulnerability_id VCID-qkp7-s947-ufcu
summary
Multiple vulnerabilities have been found in Ceph, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1759.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1759
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61314
published_at 2026-04-01T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61479
published_at 2026-04-16T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61451
published_at 2026-04-09T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61472
published_at 2026-04-11T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61458
published_at 2026-04-12T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.6144
published_at 2026-04-13T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61391
published_at 2026-04-02T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61419
published_at 2026-04-04T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61389
published_at 2026-04-07T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61435
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1759
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1811712
reference_id 1811712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1811712
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956139
reference_id 956139
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956139
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1759
reference_id CVE-2020-1759
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
2
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-1759
14
reference_url https://security.gentoo.org/glsa/202105-39
reference_id GLSA-202105-39
reference_type
scores
url https://security.gentoo.org/glsa/202105-39
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2020-1759
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkp7-s947-ufcu
27
url VCID-qr8p-ec3h-37at
vulnerability_id VCID-qr8p-ec3h-37at
summary crash: mon_command crashes ceph monitors on receiving empty prefix
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5009.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5009.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5009
reference_id
reference_type
scores
0
value 0.01361
scoring_system epss
scoring_elements 0.80115
published_at 2026-04-01T12:55:00Z
1
value 0.01361
scoring_system epss
scoring_elements 0.8019
published_at 2026-04-16T12:55:00Z
2
value 0.01361
scoring_system epss
scoring_elements 0.80185
published_at 2026-04-11T12:55:00Z
3
value 0.01361
scoring_system epss
scoring_elements 0.8017
published_at 2026-04-12T12:55:00Z
4
value 0.01361
scoring_system epss
scoring_elements 0.80161
published_at 2026-04-13T12:55:00Z
5
value 0.01361
scoring_system epss
scoring_elements 0.80123
published_at 2026-04-02T12:55:00Z
6
value 0.01361
scoring_system epss
scoring_elements 0.80142
published_at 2026-04-04T12:55:00Z
7
value 0.01361
scoring_system epss
scoring_elements 0.8013
published_at 2026-04-07T12:55:00Z
8
value 0.01361
scoring_system epss
scoring_elements 0.80159
published_at 2026-04-08T12:55:00Z
9
value 0.01361
scoring_system epss
scoring_elements 0.80166
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5009
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5009
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/ceph/ceph/commit/957ece7e95d8f8746191fd9629622d4457d690d6
reference_id
reference_type
scores
url https://github.com/ceph/ceph/commit/957ece7e95d8f8746191fd9629622d4457d690d6
6
reference_url https://github.com/ceph/ceph/pull/9700
reference_id
reference_type
scores
url https://github.com/ceph/ceph/pull/9700
7
reference_url http://tracker.ceph.com/issues/16297
reference_id
reference_type
scores
url http://tracker.ceph.com/issues/16297
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1351453
reference_id 1351453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1351453
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829661
reference_id 829661
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829661
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5009
reference_id CVE-2016-5009
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5009
18
reference_url https://access.redhat.com/errata/RHSA-2016:1384
reference_id RHSA-2016:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1384
19
reference_url https://access.redhat.com/errata/RHSA-2016:1385
reference_id RHSA-2016:1385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1385
20
reference_url https://usn.ubuntu.com/3452-1/
reference_id USN-3452-1
reference_type
scores
url https://usn.ubuntu.com/3452-1/
fixed_packages
0
url pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
purl pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-hqp5-p9fs-t3dk
19
vulnerability VCID-kxvn-yjm8-3ygt
20
vulnerability VCID-m5wq-1w2k-9khk
21
vulnerability VCID-nczx-qfyh-xubz
22
vulnerability VCID-pp2v-1dp5-4bbd
23
vulnerability VCID-qkp7-s947-ufcu
24
vulnerability VCID-r1ah-c6z7-vyen
25
vulnerability VCID-rukb-cwpx-q3hy
26
vulnerability VCID-ssk3-kfn8-vuhy
27
vulnerability VCID-xsvh-emr7-r7as
28
vulnerability VCID-yr1z-udw9-mfha
29
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-6~bpo8%252B1
aliases CVE-2016-5009
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8p-ec3h-37at
28
url VCID-r1ah-c6z7-vyen
vulnerability_id VCID-r1ah-c6z7-vyen
summary ceph: privilege escalation by unprivileged users in a ceph-fuse mounted CephFS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52555.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52555.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-52555
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05524
published_at 2026-04-02T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-16T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05558
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.0562
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05591
published_at 2026-04-12T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05584
published_at 2026-04-13T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05559
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-52555
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52555
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108410
reference_id 1108410
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108410
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374412
reference_id 2374412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374412
6
reference_url https://github.com/ceph/ceph/pull/60314
reference_id 60314
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-26T20:40:04Z/
url https://github.com/ceph/ceph/pull/60314
7
reference_url https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm
reference_id GHSA-89hm-qq33-2fjm
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-26T20:40:04Z/
url https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm
fixed_packages
0
url pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
purl pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1
1
url pkg:deb/debian/ceph@18.2.7%2Bds-1
purl pkg:deb/debian/ceph@18.2.7%2Bds-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1
aliases CVE-2025-52555
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ah-c6z7-vyen
29
url VCID-rukb-cwpx-q3hy
vulnerability_id VCID-rukb-cwpx-q3hy
summary gateway: radosgw: CRLF injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3524.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3524
reference_id
reference_type
scores
0
value 0.00857
scoring_system epss
scoring_elements 0.74942
published_at 2026-04-01T12:55:00Z
1
value 0.00857
scoring_system epss
scoring_elements 0.74945
published_at 2026-04-02T12:55:00Z
2
value 0.00857
scoring_system epss
scoring_elements 0.74974
published_at 2026-04-04T12:55:00Z
3
value 0.00857
scoring_system epss
scoring_elements 0.74949
published_at 2026-04-07T12:55:00Z
4
value 0.00857
scoring_system epss
scoring_elements 0.74983
published_at 2026-04-08T12:55:00Z
5
value 0.00857
scoring_system epss
scoring_elements 0.74995
published_at 2026-04-09T12:55:00Z
6
value 0.00857
scoring_system epss
scoring_elements 0.75017
published_at 2026-04-11T12:55:00Z
7
value 0.00857
scoring_system epss
scoring_elements 0.74996
published_at 2026-04-12T12:55:00Z
8
value 0.00857
scoring_system epss
scoring_elements 0.74986
published_at 2026-04-13T12:55:00Z
9
value 0.00857
scoring_system epss
scoring_elements 0.75022
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1951674
reference_id 1951674
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1951674
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988889
reference_id 988889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988889
6
reference_url https://access.redhat.com/errata/RHSA-2022:1174
reference_id RHSA-2022:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1174
7
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
8
reference_url https://usn.ubuntu.com/5128-1/
reference_id USN-5128-1
reference_type
scores
url https://usn.ubuntu.com/5128-1/
9
reference_url https://usn.ubuntu.com/7706-1/
reference_id USN-7706-1
reference_type
scores
url https://usn.ubuntu.com/7706-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2021-3524
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rukb-cwpx-q3hy
30
url VCID-ss2f-8hxs-myb1
vulnerability_id VCID-ss2f-8hxs-myb1
summary ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9579.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9579.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9579
reference_id
reference_type
scores
0
value 0.18013
scoring_system epss
scoring_elements 0.9513
published_at 2026-04-01T12:55:00Z
1
value 0.18013
scoring_system epss
scoring_elements 0.95141
published_at 2026-04-02T12:55:00Z
2
value 0.18013
scoring_system epss
scoring_elements 0.95142
published_at 2026-04-04T12:55:00Z
3
value 0.18013
scoring_system epss
scoring_elements 0.95144
published_at 2026-04-07T12:55:00Z
4
value 0.18013
scoring_system epss
scoring_elements 0.95152
published_at 2026-04-08T12:55:00Z
5
value 0.18013
scoring_system epss
scoring_elements 0.95156
published_at 2026-04-09T12:55:00Z
6
value 0.18013
scoring_system epss
scoring_elements 0.95161
published_at 2026-04-11T12:55:00Z
7
value 0.18013
scoring_system epss
scoring_elements 0.95162
published_at 2026-04-12T12:55:00Z
8
value 0.18013
scoring_system epss
scoring_elements 0.95165
published_at 2026-04-13T12:55:00Z
9
value 0.18013
scoring_system epss
scoring_elements 0.95173
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9579
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9579
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1403245
reference_id 1403245
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1403245
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849048
reference_id 849048
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849048
6
reference_url https://access.redhat.com/errata/RHSA-2016:2954
reference_id RHSA-2016:2954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2954
7
reference_url https://access.redhat.com/errata/RHSA-2016:2956
reference_id RHSA-2016:2956
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2956
8
reference_url https://access.redhat.com/errata/RHSA-2016:2994
reference_id RHSA-2016:2994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2994
9
reference_url https://access.redhat.com/errata/RHSA-2016:2995
reference_id RHSA-2016:2995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2995
10
reference_url https://usn.ubuntu.com/3452-1/
reference_id USN-3452-1
reference_type
scores
url https://usn.ubuntu.com/3452-1/
fixed_packages
0
url pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
purl pkg:deb/debian/ceph@10.2.5-6~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-hqp5-p9fs-t3dk
19
vulnerability VCID-kxvn-yjm8-3ygt
20
vulnerability VCID-m5wq-1w2k-9khk
21
vulnerability VCID-nczx-qfyh-xubz
22
vulnerability VCID-pp2v-1dp5-4bbd
23
vulnerability VCID-qkp7-s947-ufcu
24
vulnerability VCID-r1ah-c6z7-vyen
25
vulnerability VCID-rukb-cwpx-q3hy
26
vulnerability VCID-ssk3-kfn8-vuhy
27
vulnerability VCID-xsvh-emr7-r7as
28
vulnerability VCID-yr1z-udw9-mfha
29
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-6~bpo8%252B1
aliases CVE-2016-9579
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ss2f-8hxs-myb1
31
url VCID-ssk3-kfn8-vuhy
vulnerability_id VCID-ssk3-kfn8-vuhy
summary ceph: debug logging for v4 auth does not sanitize encryption keys
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16889.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16889.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16889
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20917
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20888
published_at 2026-04-16T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20977
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20994
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-12T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20898
published_at 2026-04-13T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21068
published_at 2026-04-02T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21121
published_at 2026-04-04T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20836
published_at 2026-04-07T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20916
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16889
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.securityfocus.com/bid/106528
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106528
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1665334
reference_id 1665334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1665334
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918969
reference_id 918969
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918969
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-16889
reference_id CVE-2018-16889
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-16889
10
reference_url https://access.redhat.com/errata/RHSA-2019:2538
reference_id RHSA-2019:2538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2538
11
reference_url https://access.redhat.com/errata/RHSA-2019:2541
reference_id RHSA-2019:2541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2541
12
reference_url https://usn.ubuntu.com/4035-1/
reference_id USN-4035-1
reference_type
scores
url https://usn.ubuntu.com/4035-1/
fixed_packages
0
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2018-16889
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssk3-kfn8-vuhy
32
url VCID-xsvh-emr7-r7as
vulnerability_id VCID-xsvh-emr7-r7as
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1128.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1128.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1128
reference_id
reference_type
scores
0
value 0.00979
scoring_system epss
scoring_elements 0.76687
published_at 2026-04-01T12:55:00Z
1
value 0.00979
scoring_system epss
scoring_elements 0.76786
published_at 2026-04-16T12:55:00Z
2
value 0.00979
scoring_system epss
scoring_elements 0.76745
published_at 2026-04-13T12:55:00Z
3
value 0.00979
scoring_system epss
scoring_elements 0.76773
published_at 2026-04-11T12:55:00Z
4
value 0.00979
scoring_system epss
scoring_elements 0.76753
published_at 2026-04-12T12:55:00Z
5
value 0.00979
scoring_system epss
scoring_elements 0.76692
published_at 2026-04-02T12:55:00Z
6
value 0.00979
scoring_system epss
scoring_elements 0.7672
published_at 2026-04-04T12:55:00Z
7
value 0.00979
scoring_system epss
scoring_elements 0.76702
published_at 2026-04-07T12:55:00Z
8
value 0.00979
scoring_system epss
scoring_elements 0.76734
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1128
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
reference_id
reference_type
scores
url https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
9
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
10
reference_url https://www.debian.org/security/2018/dsa-4339
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4339
11
reference_url http://tracker.ceph.com/issues/24836
reference_id
reference_type
scores
url http://tracker.ceph.com/issues/24836
12
reference_url http://www.openwall.com/lists/oss-security/2020/11/17/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/11/17/3
13
reference_url http://www.openwall.com/lists/oss-security/2020/11/17/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2020/11/17/4
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575866
reference_id 1575866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575866
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913471
reference_id 913471
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913471
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1128
reference_id CVE-2018-1128
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1128
30
reference_url https://access.redhat.com/errata/RHSA-2018:2177
reference_id RHSA-2018:2177
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2177
31
reference_url https://access.redhat.com/errata/RHSA-2018:2179
reference_id RHSA-2018:2179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2179
32
reference_url https://access.redhat.com/errata/RHSA-2018:2261
reference_id RHSA-2018:2261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2261
33
reference_url https://access.redhat.com/errata/RHSA-2018:2274
reference_id RHSA-2018:2274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2274
fixed_packages
0
url pkg:deb/debian/ceph@10.2.11-2
purl pkg:deb/debian/ceph@10.2.11-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-axaa-8h31-j3gd
14
vulnerability VCID-bdcb-c7nj-j7gw
15
vulnerability VCID-d8ft-cst1-5yh5
16
vulnerability VCID-fy1p-qh8k-m7b8
17
vulnerability VCID-gjne-rqt9-jqc5
18
vulnerability VCID-kxvn-yjm8-3ygt
19
vulnerability VCID-m5wq-1w2k-9khk
20
vulnerability VCID-nczx-qfyh-xubz
21
vulnerability VCID-pp2v-1dp5-4bbd
22
vulnerability VCID-qkp7-s947-ufcu
23
vulnerability VCID-r1ah-c6z7-vyen
24
vulnerability VCID-rukb-cwpx-q3hy
25
vulnerability VCID-ssk3-kfn8-vuhy
26
vulnerability VCID-xsvh-emr7-r7as
27
vulnerability VCID-yr1z-udw9-mfha
28
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.11-2
1
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2018-1128
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xsvh-emr7-r7as
33
url VCID-yr1z-udw9-mfha
vulnerability_id VCID-yr1z-udw9-mfha
summary ceph: authenticated user with read only permissions can steal dm-crypt / LUKS key
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14662.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14662.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14662
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19325
published_at 2026-04-01T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19216
published_at 2026-04-16T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19355
published_at 2026-04-09T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.19358
published_at 2026-04-11T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19309
published_at 2026-04-12T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19254
published_at 2026-04-13T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19458
published_at 2026-04-02T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19507
published_at 2026-04-04T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19224
published_at 2026-04-07T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19302
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662
4
reference_url https://ceph.com/releases/13-2-4-mimic-released
reference_id
reference_type
scores
url https://ceph.com/releases/13-2-4-mimic-released
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html
8
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1637327
reference_id 1637327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1637327
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921948
reference_id 921948
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921948
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-14662
reference_id CVE-2018-14662
reference_type
scores
0
value 2.7
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:N/A:N
1
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
2
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-14662
22
reference_url https://access.redhat.com/errata/RHSA-2019:2538
reference_id RHSA-2019:2538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2538
23
reference_url https://access.redhat.com/errata/RHSA-2019:2541
reference_id RHSA-2019:2541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2541
24
reference_url https://usn.ubuntu.com/4035-1/
reference_id USN-4035-1
reference_type
scores
url https://usn.ubuntu.com/4035-1/
25
reference_url https://usn.ubuntu.com/7706-1/
reference_id USN-7706-1
reference_type
scores
url https://usn.ubuntu.com/7706-1/
fixed_packages
0
url pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
purl pkg:deb/debian/ceph@12.2.11%2Bdfsg1-2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1fhp-86sm-bqe5
2
vulnerability VCID-1yz5-m9s7-nqdm
3
vulnerability VCID-36gd-352p-n7b7
4
vulnerability VCID-3pwt-4j1y-dbg6
5
vulnerability VCID-47cr-h639-tqd4
6
vulnerability VCID-4mk7-e67u-zkgy
7
vulnerability VCID-54nw-yq6d-2ueu
8
vulnerability VCID-5bgn-2pbq-6yd1
9
vulnerability VCID-6kbn-psnc-q3cy
10
vulnerability VCID-7k2s-fmzx-a3d8
11
vulnerability VCID-9e77-3unf-r3hu
12
vulnerability VCID-a4u3-63ez-gfbc
13
vulnerability VCID-gjne-rqt9-jqc5
14
vulnerability VCID-kxvn-yjm8-3ygt
15
vulnerability VCID-m5wq-1w2k-9khk
16
vulnerability VCID-nczx-qfyh-xubz
17
vulnerability VCID-pp2v-1dp5-4bbd
18
vulnerability VCID-qkp7-s947-ufcu
19
vulnerability VCID-r1ah-c6z7-vyen
20
vulnerability VCID-rukb-cwpx-q3hy
21
vulnerability VCID-zbwp-sfx4-xke7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-2.1
aliases CVE-2018-14662
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yr1z-udw9-mfha
34
url VCID-zbwp-sfx4-xke7
vulnerability_id VCID-zbwp-sfx4-xke7
summary ceph: RGW unauthenticated denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3531.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3531
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.49026
published_at 2026-04-01T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49061
published_at 2026-04-02T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49088
published_at 2026-04-04T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49042
published_at 2026-04-07T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49096
published_at 2026-04-08T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49093
published_at 2026-04-09T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.4911
published_at 2026-04-11T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.49083
published_at 2026-04-12T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.49089
published_at 2026-04-13T12:55:00Z
9
value 0.00257
scoring_system epss
scoring_elements 0.49134
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1955326
reference_id 1955326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1955326
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988890
reference_id 988890
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988890
6
reference_url https://access.redhat.com/errata/RHSA-2022:1174
reference_id RHSA-2022:1174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1174
7
reference_url https://usn.ubuntu.com/4998-1/
reference_id USN-4998-1
reference_type
scores
url https://usn.ubuntu.com/4998-1/
8
reference_url https://usn.ubuntu.com/5128-1/
reference_id USN-5128-1
reference_type
scores
url https://usn.ubuntu.com/5128-1/
fixed_packages
0
url pkg:deb/debian/ceph@14.2.21-1
purl pkg:deb/debian/ceph@14.2.21-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-18bk-met9-qfc9
1
vulnerability VCID-1yz5-m9s7-nqdm
2
vulnerability VCID-47cr-h639-tqd4
3
vulnerability VCID-54nw-yq6d-2ueu
4
vulnerability VCID-5bgn-2pbq-6yd1
5
vulnerability VCID-nczx-qfyh-xubz
6
vulnerability VCID-r1ah-c6z7-vyen
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1
aliases CVE-2021-3531
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbwp-sfx4-xke7
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0.80.7-1~bpo70%252B1