Lookup for vulnerable packages by Package URL.

GET /api/packages/582217?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "ceph",
    "version": "18.2.7+ds-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "18.2.7+ds-1.1",
    "latest_non_vulnerable_version": "18.2.8+ds-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64960?format=api",
            "vulnerability_id": "VCID-18bk-met9-qfc9",
            "summary": "pybind: Improper use of Pybind",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31884.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-31884.json"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31884"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126573",
                    "reference_id": "1126573",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126573"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389907",
                    "reference_id": "2389907",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2389907"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2711",
                    "reference_id": "RHSA-2026:2711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2711"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2737",
                    "reference_id": "RHSA-2026:2737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2800",
                    "reference_id": "RHSA-2026:2800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2800"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8045-1/",
                    "reference_id": "USN-8045-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8045-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-31884"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-18bk-met9-qfc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66482?format=api",
            "vulnerability_id": "VCID-1yz5-m9s7-nqdm",
            "summary": "rgw: RGW DoS attack with empty HTTP header in S3 object copy",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47866.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47866.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47866",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40532",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40541",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40504",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40484",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00211",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43591",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00211",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43642",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00211",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43654",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00211",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43629",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-47866"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47866",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47866"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120797",
                    "reference_id": "1120797",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120797"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392386",
                    "reference_id": "2392386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2392386"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8",
                    "reference_id": "GHSA-mgrm-g92q-f8h8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-11T15:29:41Z/"
                        }
                    ],
                    "url": "https://github.com/ceph/ceph/security/advisories/GHSA-mgrm-g92q-f8h8"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8045-1/",
                    "reference_id": "USN-8045-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8045-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921623?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-47866"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yz5-m9s7-nqdm"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31709?format=api",
            "vulnerability_id": "VCID-1fhp-86sm-bqe5",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25660.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25660.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50751",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50807",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50833",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50848",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50888",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50865",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5085",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00274",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50887",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25660"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354",
                    "reference_id": "1890354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975275",
                    "reference_id": "975275",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975275"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5325",
                    "reference_id": "RHSA-2020:5325",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5325"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0081",
                    "reference_id": "RHSA-2021:0081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0081"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4706-1/",
                    "reference_id": "USN-4706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4706-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585591?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.15-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.15-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-25660"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1fhp-86sm-bqe5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31712?format=api",
            "vulnerability_id": "VCID-36gd-352p-n7b7",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20288.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20288.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20288",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41336",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41428",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41457",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41384",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41434",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41442",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41431",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41416",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41459",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20288"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938031",
                    "reference_id": "1938031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938031"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986974",
                    "reference_id": "986974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986974"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2445",
                    "reference_id": "RHSA-2021:2445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2445"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1394",
                    "reference_id": "RHSA-2022:1394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1394"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5128-1/",
                    "reference_id": "USN-5128-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5128-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584186?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.20-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.20-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-20288"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36gd-352p-n7b7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82196?format=api",
            "vulnerability_id": "VCID-3pwt-4j1y-dbg6",
            "summary": "ceph: Unauthenticated clients can crash ceph RGW configured with beast as frontend",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10222.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10222.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83945",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84037",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84007",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84023",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84012",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83959",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83974",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83978",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84001",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10222"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10222"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html"
                },
                {
                    "reference_url": "https://tracker.ceph.com/issues/40018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://tracker.ceph.com/issues/40018"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739292",
                    "reference_id": "1739292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1739292"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936015",
                    "reference_id": "936015",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=936015"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10222",
                    "reference_id": "CVE-2019-10222",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2577",
                    "reference_id": "RHSA-2019:2577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2577"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2579",
                    "reference_id": "RHSA-2019:2579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2579"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4112-1/",
                    "reference_id": "USN-4112-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4112-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582214?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-10222"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3pwt-4j1y-dbg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78067?format=api",
            "vulnerability_id": "VCID-47cr-h639-tqd4",
            "summary": "rgw: improperly verified POST keys",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43040.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43040.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90893",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90844",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90855",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90862",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9087",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90868",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90833",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-43040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053690",
                    "reference_id": "1053690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053690"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216855",
                    "reference_id": "2216855",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216855"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266807",
                    "reference_id": "266807",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:41:59Z/"
                        }
                    ],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266807"
                },
                {
                    "reference_url": "https://www.ibm.com/support/pages/node/7151040",
                    "reference_id": "7151040",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-13T16:41:59Z/"
                        }
                    ],
                    "url": "https://www.ibm.com/support/pages/node/7151040"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5693",
                    "reference_id": "RHSA-2023:5693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0745",
                    "reference_id": "RHSA-2024:0745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0745"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6613-1/",
                    "reference_id": "USN-6613-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6613-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585061?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586542?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.11%2Bds-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.11%252Bds-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-43040"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47cr-h639-tqd4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31711?format=api",
            "vulnerability_id": "VCID-4mk7-e67u-zkgy",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27781.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27781.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21741",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21906",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21959",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21725",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21802",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21858",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2183",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21773",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900109",
                    "reference_id": "1900109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900109"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670",
                    "reference_id": "985670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0081",
                    "reference_id": "RHSA-2021:0081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0081"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1518",
                    "reference_id": "RHSA-2021:1518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1518"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5128-1/",
                    "reference_id": "USN-5128-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5128-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582856?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.16-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.16-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-27781"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk7-e67u-zkgy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30954?format=api",
            "vulnerability_id": "VCID-54nw-yq6d-2ueu",
            "summary": "A vulnerability has been found in Ceph which can lead to root privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3650.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3650.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3650",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07083",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07132",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07161",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07193",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0719",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07179",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07171",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07106",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3650"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3650",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3650"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024932",
                    "reference_id": "1024932",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024932"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136909",
                    "reference_id": "2136909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136909"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202312-10",
                    "reference_id": "GLSA-202312-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202312-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0980",
                    "reference_id": "RHSA-2023:0980",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0980"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6063-1/",
                    "reference_id": "USN-6063-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6063-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6292-1/",
                    "reference_id": "USN-6292-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6292-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585061?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585411?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.10%2Bds-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.10%252Bds-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-3650"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-54nw-yq6d-2ueu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79187?format=api",
            "vulnerability_id": "VCID-5bgn-2pbq-6yd1",
            "summary": "ceph: user/tenant can obtain access (read/write) to any share",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0670.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0670.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41515",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41604",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41632",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41609",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41607",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41618",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4164",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00223",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44967",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0670"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016069",
                    "reference_id": "1016069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016069"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050728",
                    "reference_id": "2050728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050728"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5997",
                    "reference_id": "RHSA-2022:5997",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5997"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6063-1/",
                    "reference_id": "USN-6063-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6063-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584391?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584392?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.10%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.10%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-0670"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bgn-2pbq-6yd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81446?format=api",
            "vulnerability_id": "VCID-6kbn-psnc-q3cy",
            "summary": "ceph: specially crafted XML payload on POST requests leads to DoS by crashing RGW",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12059.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12059.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51783",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51769",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51824",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51821",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51852",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51837",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00284",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51879",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12059"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12059"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827262",
                    "reference_id": "1827262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827262"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1518",
                    "reference_id": "RHSA-2021:1518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1518"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4528-1/",
                    "reference_id": "USN-4528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4528-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582214?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-12059"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kbn-psnc-q3cy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31710?format=api",
            "vulnerability_id": "VCID-7k2s-fmzx-a3d8",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25678.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25678.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02843",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02909",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02924",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02933",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02958",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02928",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02908",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02901",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04957",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25678"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892109",
                    "reference_id": "1892109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892109"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1452",
                    "reference_id": "RHSA-2021:1452",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1452"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586566?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.18-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.18-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-25678"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7k2s-fmzx-a3d8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80282?format=api",
            "vulnerability_id": "VCID-9e77-3unf-r3hu",
            "summary": "ceph-dashboard: Cross-site scripting via token Cookie",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3509.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3509.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69311",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69323",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6934",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6932",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6937",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69386",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69408",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69393",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69379",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69417",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3509"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3509"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950116",
                    "reference_id": "1950116",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950116"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988888",
                    "reference_id": "988888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988888"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2445",
                    "reference_id": "RHSA-2021:2445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2445"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5128-1/",
                    "reference_id": "USN-5128-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5128-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3509"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9e77-3unf-r3hu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31706?format=api",
            "vulnerability_id": "VCID-a4u3-63ez-gfbc",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10753.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10753.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61026",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61103",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61131",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61097",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61145",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6116",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61181",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61168",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61148",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00407",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61189",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840744",
                    "reference_id": "1840744",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1840744"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300",
                    "reference_id": "975300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3003",
                    "reference_id": "RHSA-2020:3003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3003"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3504",
                    "reference_id": "RHSA-2020:3504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3504"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3505",
                    "reference_id": "RHSA-2020:3505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3505"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4528-1/",
                    "reference_id": "USN-4528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4528-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4706-1/",
                    "reference_id": "USN-4706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4706-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585591?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.15-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.15-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-10753"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a4u3-63ez-gfbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72566?format=api",
            "vulnerability_id": "VCID-axaa-8h31-j3gd",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1129.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1129.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55853",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55816",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60944",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60805",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60878",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60907",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60871",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60937",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00404",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60958",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1129"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4339"
                },
                {
                    "reference_url": "http://tracker.ceph.com/issues/24837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://tracker.ceph.com/issues/24837"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576057",
                    "reference_id": "1576057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576057"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913472",
                    "reference_id": "913472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913472"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1129",
                    "reference_id": "CVE-2018-1129",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2177",
                    "reference_id": "RHSA-2018:2177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2179",
                    "reference_id": "RHSA-2018:2179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2261",
                    "reference_id": "RHSA-2018:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2274",
                    "reference_id": "RHSA-2018:2274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2274"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584940?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.8%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.8%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1129"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axaa-8h31-j3gd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72563?format=api",
            "vulnerability_id": "VCID-bdcb-c7nj-j7gw",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10861.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10861.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68813",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68922",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68924",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6891",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68881",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68831",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68882",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0058",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68901",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4339"
                },
                {
                    "reference_url": "http://tracker.ceph.com/issues/24838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://tracker.ceph.com/issues/24838"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104742"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593308",
                    "reference_id": "1593308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593308"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913470",
                    "reference_id": "913470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913470"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:10.2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:12.2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:ceph:13.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10861",
                    "reference_id": "CVE-2018-10861",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:P"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10861"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2177",
                    "reference_id": "RHSA-2018:2177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2179",
                    "reference_id": "RHSA-2018:2179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2261",
                    "reference_id": "RHSA-2018:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2274",
                    "reference_id": "RHSA-2018:2274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2274"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584940?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.8%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.8%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-10861"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdcb-c7nj-j7gw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85555?format=api",
            "vulnerability_id": "VCID-bysx-t7fz-5kdk",
            "summary": "Ceph: RGW returns requested bucket name raw in Bucket response header",
            "references": [
                {
                    "reference_url": "http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.ceph.com/pipermail/ceph-announce-ceph.com/2015-October/000034.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5245.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5245.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5245",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58278",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58132",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58218",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58238",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58213",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58267",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58272",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5829",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58246",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5245"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5245",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5245"
                },
                {
                    "reference_url": "http://tracker.ceph.com/issues/12537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://tracker.ceph.com/issues/12537"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261606",
                    "reference_id": "1261606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261606"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798567",
                    "reference_id": "798567",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798567"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5245",
                    "reference_id": "CVE-2015-5245",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2066",
                    "reference_id": "RHSA-2015:2066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2066"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2512",
                    "reference_id": "RHSA-2015:2512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2512"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586496?format=api",
                    "purl": "pkg:deb/debian/ceph@0.80.10-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0.80.10-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-5245"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bysx-t7fz-5kdk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85516?format=api",
            "vulnerability_id": "VCID-cm58-jgsb-7yaf",
            "summary": "ceph: RGW permits bucket listing when authenticated_users=read",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7031.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7031.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72952",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72964",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72983",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72959",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72996",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7301",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73014",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73007",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73049",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7031"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372446",
                    "reference_id": "1372446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372446"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838026",
                    "reference_id": "838026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838026"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1972",
                    "reference_id": "RHSA-2016:1972",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1972"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1973",
                    "reference_id": "RHSA-2016:1973",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1973"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3452-1/",
                    "reference_id": "USN-3452-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3452-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585597?format=api",
                    "purl": "pkg:deb/debian/ceph@10.2.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-7031"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cm58-jgsb-7yaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83902?format=api",
            "vulnerability_id": "VCID-cqkj-bda2-2fb2",
            "summary": "ceph: Failed assertion through user input in ceph_assert() function in rgw_iam_policy.cc",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16818.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16818.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69023",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69127",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69109",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69132",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69117",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69087",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69039",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6906",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6904",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69089",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16818"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/ceph/commit/b3118cabb8060a8cc6a01c4e8264cb18e7b1745a"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6VJA32U7HKGDRJQDJVM7JBYWD4T7BJL/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6VJA32U7HKGDRJQDJVM7JBYWD4T7BJL/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515872",
                    "reference_id": "1515872",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515872"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:27:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16818",
                    "reference_id": "CVE-2017-16818",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16818"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16818"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqkj-bda2-2fb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72561?format=api",
            "vulnerability_id": "VCID-d8ft-cst1-5yh5",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7519.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7519.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12924",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12777",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1292",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12876",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13015",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12866",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12944",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12956",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460331",
                    "reference_id": "1460331",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460331"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864535",
                    "reference_id": "864535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864535"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584940?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.8%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.8%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7519"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8ft-cst1-5yh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83666?format=api",
            "vulnerability_id": "VCID-dqnx-pbyr-43at",
            "summary": "ceph: Unauthenticated malformed HTTP requests handled by rgw_civetweb.cc:RGW::init_env() can lead to denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7262.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7262.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81281",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8129",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81312",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81311",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81339",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81365",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81351",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81343",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81381",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7262"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546610",
                    "reference_id": "1546610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0546",
                    "reference_id": "RHSA-2018:0546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0546"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0548",
                    "reference_id": "RHSA-2018:0548",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0548"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-7262"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqnx-pbyr-43at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82895?format=api",
            "vulnerability_id": "VCID-fy1p-qh8k-m7b8",
            "summary": "ceph: ListBucket max-keys has no defined limit in the RGW codebase",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16846.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16846.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89203",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89263",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89248",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89257",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89254",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8925",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89223",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89225",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04603",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89243",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16846"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846"
                },
                {
                    "reference_url": "https://ceph.com/releases/13-2-4-mimic-released/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://ceph.com/releases/13-2-4-mimic-released/"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644461",
                    "reference_id": "1644461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644461"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921947",
                    "reference_id": "921947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921947"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16846",
                    "reference_id": "CVE-2018-16846",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16846"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2538",
                    "reference_id": "RHSA-2019:2538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2541",
                    "reference_id": "RHSA-2019:2541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2541"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4035-1/",
                    "reference_id": "USN-4035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4035-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583734?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.11%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16846"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fy1p-qh8k-m7b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84830?format=api",
            "vulnerability_id": "VCID-gj55-s7r1-f3b4",
            "summary": "Ceph: RGW Denial of Service by sending null or specially crafted POST object requests",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8626.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8626.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86211",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86293",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86281",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86277",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86221",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86238",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86239",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86258",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86269",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02873",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86283",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8626"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389193",
                    "reference_id": "1389193",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389193"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844200",
                    "reference_id": "844200",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844200"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2815",
                    "reference_id": "RHSA-2016:2815",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2815"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2816",
                    "reference_id": "RHSA-2016:2816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2847",
                    "reference_id": "RHSA-2016:2847",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2847"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2848",
                    "reference_id": "RHSA-2016:2848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2848"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3452-1/",
                    "reference_id": "USN-3452-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3452-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585597?format=api",
                    "purl": "pkg:deb/debian/ceph@10.2.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8626"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gj55-s7r1-f3b4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81667?format=api",
            "vulnerability_id": "VCID-gjne-rqt9-jqc5",
            "summary": "ceph: improper URL checking leads to information disclosure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82808",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82824",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82834",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82859",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82866",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82881",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82876",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82911",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792337",
                    "reference_id": "1792337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792337"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949206",
                    "reference_id": "949206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949206"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586641?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.6-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.6-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-1699"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gjne-rqt9-jqc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82785?format=api",
            "vulnerability_id": "VCID-grz8-4a4n-1fap",
            "summary": "ceph: radosgw: Resource exhaustion via TCP connection to port serving the SSL endpoint",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3821.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3821.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75456",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75522",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75541",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7552",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75511",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75459",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7549",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7547",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75512",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3821"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3821"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ceph/civetweb/pull/33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/civetweb/pull/33"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656852",
                    "reference_id": "1656852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656852"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:civetweb:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ceph:civetweb:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ceph:civetweb:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3821",
                    "reference_id": "CVE-2019-3821",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3821"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4035-1/",
                    "reference_id": "USN-4035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4035-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-3821"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grz8-4a4n-1fap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31708?format=api",
            "vulnerability_id": "VCID-kxvn-yjm8-3ygt",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1760.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1760.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57618",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57703",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57725",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57699",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57754",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57772",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57751",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57732",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57761",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1760"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1812962",
                    "reference_id": "1812962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1812962"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956142",
                    "reference_id": "956142",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956142"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3003",
                    "reference_id": "RHSA-2020:3003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3003"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4528-1/",
                    "reference_id": "USN-4528-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4528-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583724?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-1760"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kxvn-yjm8-3ygt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81515?format=api",
            "vulnerability_id": "VCID-m5wq-1w2k-9khk",
            "summary": "ceph-dashboard: Don't use Browser's LocalStorage for storing JWT but Secure Cookies with proper HTTP Headers",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56235",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56345",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56367",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56349",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56405",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56414",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5639",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56373",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56404",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27839"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901330",
                    "reference_id": "1901330",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901330"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670",
                    "reference_id": "985670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2445",
                    "reference_id": "RHSA-2021:2445",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2445"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586566?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.18-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.18-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-27839"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5wq-1w2k-9khk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78891?format=api",
            "vulnerability_id": "VCID-mqt6-kw7g-xff7",
            "summary": "ceph: possible DoS issue in ceph URL processing on RGW backends",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3854.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3854.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3854",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23367",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2334",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23302",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23245",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23408",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23195",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23269",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23319",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-3854"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027151",
                    "reference_id": "1027151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027151"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139925",
                    "reference_id": "2139925",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T18:53:45Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139925"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6063-1/",
                    "reference_id": "USN-6063-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6063-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586970?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.10%2Bds-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.10%252Bds-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-3854"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mqt6-kw7g-xff7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79824?format=api",
            "vulnerability_id": "VCID-nczx-qfyh-xubz",
            "summary": "ceph: Ceph volume does not honour osd_dmcrypt_key_size",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3979.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3979.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50894",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50973",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5093",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50987",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50985",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51027",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51006",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5099",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51028",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3979"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3979"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788",
                    "reference_id": "2024788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1174",
                    "reference_id": "RHSA-2022:1174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1174"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6063-1/",
                    "reference_id": "USN-6063-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6063-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585061?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585062?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.9%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.9%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3979"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nczx-qfyh-xubz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81717?format=api",
            "vulnerability_id": "VCID-p6nr-dpnz-u3gs",
            "summary": "ceph: denial of service in RGW daemon",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19337.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19337.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19337",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66849",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66886",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66913",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66934",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66948",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66968",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66954",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00523",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66955",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19337"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781170",
                    "reference_id": "1781170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1781170"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4353",
                    "reference_id": "RHSA-2019:4353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4353"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:4357",
                    "reference_id": "RHSA-2019:4357",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:4357"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-19337"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p6nr-dpnz-u3gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81629?format=api",
            "vulnerability_id": "VCID-pp2v-1dp5-4bbd",
            "summary": "ceph: connection leak in the RGW Beast front-end permits a DoS against the RGW server",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1700.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1700.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55484",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55595",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55619",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55596",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55648",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55651",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5566",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55623",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55661",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1700"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1700"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791691",
                    "reference_id": "1791691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791691"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4304-1/",
                    "reference_id": "USN-4304-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4304-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586688?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-1700"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pp2v-1dp5-4bbd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31707?format=api",
            "vulnerability_id": "VCID-qkp7-s947-ufcu",
            "summary": "Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1759.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1759.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1759",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61314",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61479",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61472",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61391",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61419",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61435",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1759"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811712",
                    "reference_id": "1811712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811712"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956139",
                    "reference_id": "956139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956139"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1759",
                    "reference_id": "CVE-2020-1759",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1759"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-39",
                    "reference_id": "GLSA-202105-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-39"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583724?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.9-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.9-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-1759"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qkp7-s947-ufcu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85097?format=api",
            "vulnerability_id": "VCID-qr8p-ec3h-37at",
            "summary": "crash: mon_command crashes ceph monitors on receiving empty prefix",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5009.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5009.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80115",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80123",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80142",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8013",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80159",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01361",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80166",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5009"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5009"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/commit/957ece7e95d8f8746191fd9629622d4457d690d6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/ceph/commit/957ece7e95d8f8746191fd9629622d4457d690d6"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/pull/9700",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/ceph/pull/9700"
                },
                {
                    "reference_url": "http://tracker.ceph.com/issues/16297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://tracker.ceph.com/issues/16297"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351453",
                    "reference_id": "1351453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351453"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829661",
                    "reference_id": "829661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=829661"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5009",
                    "reference_id": "CVE-2016-5009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1384",
                    "reference_id": "RHSA-2016:1384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1385",
                    "reference_id": "RHSA-2016:1385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1385"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3452-1/",
                    "reference_id": "USN-3452-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3452-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585597?format=api",
                    "purl": "pkg:deb/debian/ceph@10.2.5-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-5009"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8p-ec3h-37at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68988?format=api",
            "vulnerability_id": "VCID-r1ah-c6z7-vyen",
            "summary": "ceph: privilege escalation by unprivileged users in a ceph-fuse mounted CephFS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52555.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-52555.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52555",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05524",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05532",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05558",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05595",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0562",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05591",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05584",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05559",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-52555"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52555",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52555"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108410",
                    "reference_id": "1108410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108410"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374412",
                    "reference_id": "2374412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374412"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/pull/60314",
                    "reference_id": "60314",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-26T20:40:04Z/"
                        }
                    ],
                    "url": "https://github.com/ceph/ceph/pull/60314"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm",
                    "reference_id": "GHSA-89hm-qq33-2fjm",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-26T20:40:04Z/"
                        }
                    ],
                    "url": "https://github.com/ceph/ceph/security/advisories/GHSA-89hm-qq33-2fjm"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585061?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921624?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-52555"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ah-c6z7-vyen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80451?format=api",
            "vulnerability_id": "VCID-rukb-cwpx-q3hy",
            "summary": "gateway: radosgw: CRLF injection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3524.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3524.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74942",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74974",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74949",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74983",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75017",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75022",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3524"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951674",
                    "reference_id": "1951674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951674"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988889",
                    "reference_id": "988889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1174",
                    "reference_id": "RHSA-2022:1174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1174"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5128-1/",
                    "reference_id": "USN-5128-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5128-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7706-1/",
                    "reference_id": "USN-7706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7706-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3524"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rukb-cwpx-q3hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84694?format=api",
            "vulnerability_id": "VCID-ss2f-8hxs-myb1",
            "summary": "ceph: Object Gateway server DoS by sending invalid cross-origin HTTP request",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9579.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9579.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9513",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95141",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95142",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95144",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95156",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95162",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95165",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.18013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95173",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9579"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403245",
                    "reference_id": "1403245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403245"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849048",
                    "reference_id": "849048",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849048"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2954",
                    "reference_id": "RHSA-2016:2954",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2954"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2956",
                    "reference_id": "RHSA-2016:2956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2956"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2994",
                    "reference_id": "RHSA-2016:2994",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2994"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2995",
                    "reference_id": "RHSA-2016:2995",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2995"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3452-1/",
                    "reference_id": "USN-3452-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3452-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584170?format=api",
                    "purl": "pkg:deb/debian/ceph@10.2.5-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@10.2.5-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9579"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ss2f-8hxs-myb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82884?format=api",
            "vulnerability_id": "VCID-ssk3-kfn8-vuhy",
            "summary": "ceph: debug logging for v4 auth does not sanitize encryption keys",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16889.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16889.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20917",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20888",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20977",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20994",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20951",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20898",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21068",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21121",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20836",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20916",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16889"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16889"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106528"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665334",
                    "reference_id": "1665334",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665334"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918969",
                    "reference_id": "918969",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=918969"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16889",
                    "reference_id": "CVE-2018-16889",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2538",
                    "reference_id": "RHSA-2019:2538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2541",
                    "reference_id": "RHSA-2019:2541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2541"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4035-1/",
                    "reference_id": "USN-4035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4035-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583734?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.11%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16889"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssk3-kfn8-vuhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81277?format=api",
            "vulnerability_id": "VCID-vkxb-yabn-wyhu",
            "summary": "ceph: authorization bypass in monitor and manager daemons",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10736.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10736.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20994",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21149",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21203",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20917",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20997",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21058",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21074",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2103",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20979",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20967",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10736"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833025",
                    "reference_id": "1833025",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833025"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4706-1/",
                    "reference_id": "USN-4706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4706-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-10736"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vkxb-yabn-wyhu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72645?format=api",
            "vulnerability_id": "VCID-www5-5x6q-xyeu",
            "summary": "ceph: rhceph-container: Authentication bypass in CEPH RadosGW",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-48916.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-48916.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-48916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1057",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.107",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10714",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10682",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10658",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10652",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00036",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10643",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11472",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-48916"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088993",
                    "reference_id": "1088993",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088993"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329846",
                    "reference_id": "2329846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329846"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/security/advisories/GHSA-5g9m-mmp6-93mq",
                    "reference_id": "GHSA-5g9m-mmp6-93mq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T19:54:31Z/"
                        }
                    ],
                    "url": "https://github.com/ceph/ceph/security/advisories/GHSA-5g9m-mmp6-93mq"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10956",
                    "reference_id": "RHSA-2024:10956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10956"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10957",
                    "reference_id": "RHSA-2024:10957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10957"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4238",
                    "reference_id": "RHSA-2025:4238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:4664",
                    "reference_id": "RHSA-2025:4664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:4664"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7182-1/",
                    "reference_id": "USN-7182-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7182-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583480?format=api",
                    "purl": "pkg:deb/debian/ceph@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585655?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.4%2Bds-11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.4%252Bds-11%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-48916"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-www5-5x6q-xyeu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72565?format=api",
            "vulnerability_id": "VCID-xsvh-emr7-r7as",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1128.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1128.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76687",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76786",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76773",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76753",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7672",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76702",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00979",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76734",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7519"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4339"
                },
                {
                    "reference_url": "http://tracker.ceph.com/issues/24836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://tracker.ceph.com/issues/24836"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2020/11/17/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2020/11/17/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2020/11/17/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2020/11/17/4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575866",
                    "reference_id": "1575866",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575866"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913471",
                    "reference_id": "913471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913471"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_mon:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage_osd:3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1128",
                    "reference_id": "CVE-2018-1128",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1128"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2177",
                    "reference_id": "RHSA-2018:2177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2177"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2179",
                    "reference_id": "RHSA-2018:2179",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2179"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2261",
                    "reference_id": "RHSA-2018:2261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2261"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2274",
                    "reference_id": "RHSA-2018:2274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2274"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584940?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.8%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.8%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1128"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xsvh-emr7-r7as"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82894?format=api",
            "vulnerability_id": "VCID-yr1z-udw9-mfha",
            "summary": "ceph: authenticated user with read only permissions can steal dm-crypt / LUKS key",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14662.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14662.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19325",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19216",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19355",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19358",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19309",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19254",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19507",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19224",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19302",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14662"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14662"
                },
                {
                    "reference_url": "https://ceph.com/releases/13-2-4-mimic-released",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://ceph.com/releases/13-2-4-mimic-released"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14662",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14662"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1637327",
                    "reference_id": "1637327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1637327"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921948",
                    "reference_id": "921948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921948"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14662",
                    "reference_id": "CVE-2018-14662",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2538",
                    "reference_id": "RHSA-2019:2538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2541",
                    "reference_id": "RHSA-2019:2541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2541"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4035-1/",
                    "reference_id": "USN-4035-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4035-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7706-1/",
                    "reference_id": "USN-7706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7706-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583734?format=api",
                    "purl": "pkg:deb/debian/ceph@12.2.11%2Bdfsg1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@12.2.11%252Bdfsg1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-14662"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yr1z-udw9-mfha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80284?format=api",
            "vulnerability_id": "VCID-zbwp-sfx4-xke7",
            "summary": "ceph: RGW unauthenticated denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3531.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3531.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49026",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49061",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49088",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49042",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49096",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49093",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49089",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49134",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3531"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3531"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955326",
                    "reference_id": "1955326",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955326"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988890",
                    "reference_id": "988890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1174",
                    "reference_id": "RHSA-2022:1174",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1174"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4998-1/",
                    "reference_id": "USN-4998-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4998-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5128-1/",
                    "reference_id": "USN-5128-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5128-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582215?format=api",
                    "purl": "pkg:deb/debian/ceph@14.2.21-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@14.2.21-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582216?format=api",
                    "purl": "pkg:deb/debian/ceph@16.2.15%2Bds-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        },
                        {
                            "vulnerability": "VCID-r1ah-c6z7-vyen"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@16.2.15%252Bds-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582217?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.7%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-18bk-met9-qfc9"
                        },
                        {
                            "vulnerability": "VCID-1yz5-m9s7-nqdm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582218?format=api",
                    "purl": "pkg:deb/debian/ceph@18.2.8%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.8%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-3531"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zbwp-sfx4-xke7"
        }
    ],
    "risk_score": "3.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ceph@18.2.7%252Bds-1%3Fdistro=trixie"
}