{"url":"http://public2.vulnerablecode.io/api/packages/100865?format=json","purl":"pkg:rpm/redhat/grub2@1:2.02-0.86.el7_3?arch=2","type":"rpm","namespace":"redhat","name":"grub2","version":"1:2.02-0.86.el7_3","qualifiers":{"arch":"2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61382?format=json","vulnerability_id":"VCID-744c-pb2n-5kf4","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20225.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20225","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21385","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2152","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21334","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21412","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22545","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22544","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924696","reference_id":"1924696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1924696"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"},{"reference_url":"https://usn.ubuntu.com/4992-1/","reference_id":"USN-4992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4992-1/"}],"fixed_packages":[],"aliases":["CVE-2021-20225"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-744c-pb2n-5kf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61381?format=json","vulnerability_id":"VCID-8axp-fasm-8ka4","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27779.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27779","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0363","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03618","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03625","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03675","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03581","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03603","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03559","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0348","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05358","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900698","reference_id":"1900698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900698"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"},{"reference_url":"https://usn.ubuntu.com/4992-1/","reference_id":"USN-4992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4992-1/"}],"fixed_packages":[],"aliases":["CVE-2020-27779"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8axp-fasm-8ka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61383?format=json","vulnerability_id":"VCID-f6ad-7qb1-9bcd","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20233.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20233.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20233","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38614","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38751","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38766","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38695","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38745","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40259","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40497","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40484","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40401","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20233"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1926263","reference_id":"1926263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1926263"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"},{"reference_url":"https://usn.ubuntu.com/4992-1/","reference_id":"USN-4992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4992-1/"}],"fixed_packages":[],"aliases":["CVE-2021-20233"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6ad-7qb1-9bcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61380?format=json","vulnerability_id":"VCID-m4y5-twzm-dqcw","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27749.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27749","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13745","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13862","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14049","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14101","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14046","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14008","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13957","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13851","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.13922","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1899966","reference_id":"1899966","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1899966"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"},{"reference_url":"https://usn.ubuntu.com/4992-1/","reference_id":"USN-4992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4992-1/"}],"fixed_packages":[],"aliases":["CVE-2020-27749"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m4y5-twzm-dqcw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61379?format=json","vulnerability_id":"VCID-m5vd-4m54-6ygc","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25647.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25647.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25647","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0116","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01158","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01157","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01449","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01461","published_at":"2026-04-02T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00917","published_at":"2026-05-05T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00858","published_at":"2026-04-16T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.0092","published_at":"2026-04-26T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00915","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00913","published_at":"2026-04-21T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00916","published_at":"2026-04-24T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00865","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1886936","reference_id":"1886936","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1886936"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"}],"fixed_packages":[],"aliases":["CVE-2020-25647"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5vd-4m54-6ygc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61374?format=json","vulnerability_id":"VCID-uqg4-wh5j-6ud1","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14372.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14372","reference_id":"","reference_type":"","scores":[{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83261","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83199","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83221","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83229","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83236","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83153","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83162","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83158","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01884","scoring_system":"epss","scoring_elements":"0.83196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02096","scoring_system":"epss","scoring_elements":"0.83992","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02096","scoring_system":"epss","scoring_elements":"0.83978","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1873150","reference_id":"1873150","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1873150"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"},{"reference_url":"https://usn.ubuntu.com/4992-1/","reference_id":"USN-4992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4992-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14372"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqg4-wh5j-6ud1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61378?format=json","vulnerability_id":"VCID-v98w-vw6u-dyb3","summary":"Multiple vulnerabilities have been found in GRUB, the worst might\n    allow for circumvention of UEFI Secure Boot.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25632.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25632","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05386","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0516","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05393","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06131","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06841","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879577","reference_id":"1879577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1879577"},{"reference_url":"https://security.archlinux.org/ASA-202106-43","reference_id":"ASA-202106-43","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-43"},{"reference_url":"https://security.archlinux.org/AVG-1629","reference_id":"AVG-1629","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1629"},{"reference_url":"https://security.gentoo.org/glsa/202104-05","reference_id":"GLSA-202104-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202104-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0696","reference_id":"RHSA-2021:0696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0697","reference_id":"RHSA-2021:0697","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0697"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0698","reference_id":"RHSA-2021:0698","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0698"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0699","reference_id":"RHSA-2021:0699","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0699"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0700","reference_id":"RHSA-2021:0700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0701","reference_id":"RHSA-2021:0701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0702","reference_id":"RHSA-2021:0702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0703","reference_id":"RHSA-2021:0703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0704","reference_id":"RHSA-2021:0704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1734","reference_id":"RHSA-2021:1734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2566","reference_id":"RHSA-2021:2566","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2566"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2790","reference_id":"RHSA-2021:2790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3675","reference_id":"RHSA-2021:3675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3675"},{"reference_url":"https://usn.ubuntu.com/4992-1/","reference_id":"USN-4992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4992-1/"}],"fixed_packages":[],"aliases":["CVE-2020-25632"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v98w-vw6u-dyb3"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/grub2@1:2.02-0.86.el7_3%3Farch=2"}