{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","type":"ebuild","namespace":"sys-cluster","name":"ceph","version":"14.2.21","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"17.2.6","latest_non_vulnerable_version":"17.2.6","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31709?format=json","vulnerability_id":"VCID-1fhp-86sm-bqe5","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25660.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25660.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25660","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50807","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50848","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50888","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5085","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50822","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.5079","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50713","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25660"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890354","reference_id":"1890354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890354"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975275","reference_id":"975275","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975275"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5325","reference_id":"RHSA-2020:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0081","reference_id":"RHSA-2021:0081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0081"},{"reference_url":"https://usn.ubuntu.com/4706-1/","reference_id":"USN-4706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2020-25660"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1fhp-86sm-bqe5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31712?format=json","vulnerability_id":"VCID-36gd-352p-n7b7","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20288.json","reference_id":"","reference_type":"","scores":[{"value":"8.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20288.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20288","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41336","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41434","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41463","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41431","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41416","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41357","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41243","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41026","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-20288"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20288"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1938031","reference_id":"1938031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1938031"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986974","reference_id":"986974","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986974"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2445","reference_id":"RHSA-2021:2445","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2445"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1394","reference_id":"RHSA-2022:1394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1394"},{"reference_url":"https://usn.ubuntu.com/4998-1/","reference_id":"USN-4998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4998-1/"},{"reference_url":"https://usn.ubuntu.com/5128-1/","reference_id":"USN-5128-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5128-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2021-20288"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36gd-352p-n7b7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31711?format=json","vulnerability_id":"VCID-4mk7-e67u-zkgy","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27781.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27781","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21741","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21906","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21959","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21725","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21779","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21744","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2159","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21485","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27781"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900109","reference_id":"1900109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1900109"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670","reference_id":"985670","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985670"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0081","reference_id":"RHSA-2021:0081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1518","reference_id":"RHSA-2021:1518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1518"},{"reference_url":"https://usn.ubuntu.com/4998-1/","reference_id":"USN-4998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4998-1/"},{"reference_url":"https://usn.ubuntu.com/5128-1/","reference_id":"USN-5128-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5128-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2020-27781"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk7-e67u-zkgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31710?format=json","vulnerability_id":"VCID-7k2s-fmzx-a3d8","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25678.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25678.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25678","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02924","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02931","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.02901","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05115","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0514","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0517","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-25678"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1892109","reference_id":"1892109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1892109"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1452","reference_id":"RHSA-2021:1452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1452"},{"reference_url":"https://usn.ubuntu.com/4998-1/","reference_id":"USN-4998-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4998-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2020-25678"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7k2s-fmzx-a3d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31706?format=json","vulnerability_id":"VCID-a4u3-63ez-gfbc","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10753.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10753","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61026","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.6116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61168","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61189","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61195","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61165","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61121","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10753"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1840744","reference_id":"1840744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1840744"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300","reference_id":"975300","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=975300"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3003","reference_id":"RHSA-2020:3003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3504","reference_id":"RHSA-2020:3504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3505","reference_id":"RHSA-2020:3505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3505"},{"reference_url":"https://usn.ubuntu.com/4528-1/","reference_id":"USN-4528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4528-1/"},{"reference_url":"https://usn.ubuntu.com/4706-1/","reference_id":"USN-4706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2020-10753"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a4u3-63ez-gfbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31708?format=json","vulnerability_id":"VCID-kxvn-yjm8-3ygt","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1760.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1760","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57703","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57758","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57735","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57691","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57645","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1760"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812962","reference_id":"1812962","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812962"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956142","reference_id":"956142","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956142"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3003","reference_id":"RHSA-2020:3003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3003"},{"reference_url":"https://usn.ubuntu.com/4528-1/","reference_id":"USN-4528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2020-1760"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kxvn-yjm8-3ygt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31707?format=json","vulnerability_id":"VCID-qkp7-s947-ufcu","summary":"Multiple vulnerabilities have been found in Ceph, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1759.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1759.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1759","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61314","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61464","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.6144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61483","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1759"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1759"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3A2UFR5IUIEXJUCF64GQ5OVLCZGODXE/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1811712","reference_id":"1811712","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1811712"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956139","reference_id":"956139","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956139"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:ceph:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1759","reference_id":"CVE-2020-1759","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"},{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1759"},{"reference_url":"https://security.gentoo.org/glsa/202105-39","reference_id":"GLSA-202105-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-39"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71954?format=json","purl":"pkg:ebuild/sys-cluster/ceph@14.2.21","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}],"aliases":["CVE-2020-1759"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qkp7-s947-ufcu"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-cluster/ceph@14.2.21"}