Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/linux@6.0.12-1
Typealpm
Namespacearchlinux
Namelinux
Version6.0.12-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.2-1
Latest_non_vulnerable_version6.2-1
Affected_by_vulnerabilities
0
url VCID-2na9-p1ae-2bdc
vulnerability_id VCID-2na9-p1ae-2bdc
summary kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4379.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4379
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-24T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58017
published_at 2026-04-02T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58039
published_at 2026-04-04T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58015
published_at 2026-04-07T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.5807
published_at 2026-04-08T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58073
published_at 2026-04-09T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58089
published_at 2026-04-11T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.58067
published_at 2026-04-12T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-13T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.58076
published_at 2026-04-18T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.58053
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://seclists.org/oss-sec/2022/q4/185
reference_id 185
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://seclists.org/oss-sec/2022/q4/185
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152807
reference_id 2152807
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152807
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0
reference_id ?id=75333d48f92256a0dec91dbf07835e804fc411c0
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75333d48f92256a0dec91dbf07835e804fc411c0
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da
reference_id ?id=aeba12b26c79fc35e07e511f692a8907037d95da
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aeba12b26c79fc35e07e511f692a8907037d95da
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/
reference_id LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/
13
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/
reference_id RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-08T18:38:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/
15
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
16
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
17
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
18
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
19
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
20
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
21
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
22
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
23
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
24
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
25
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
26
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
27
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
28
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
29
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
30
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
31
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-4379
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2na9-p1ae-2bdc
1
url VCID-369a-xh7h-9uca
vulnerability_id VCID-369a-xh7h-9uca
summary kernel: usb: use-after-free write in put_dev
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4382.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4382
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08446
published_at 2026-04-24T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08466
published_at 2026-04-08T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08484
published_at 2026-04-09T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08479
published_at 2026-04-21T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08458
published_at 2026-04-12T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08444
published_at 2026-04-13T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08337
published_at 2026-04-16T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.0832
published_at 2026-04-18T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08421
published_at 2026-04-02T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08474
published_at 2026-04-04T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08394
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182440
reference_id 2182440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182440
5
reference_url https://www.openwall.com/lists/oss-security/2022/12/14/5
reference_id 5
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-09T15:33:38Z/
url https://www.openwall.com/lists/oss-security/2022/12/14/5
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
11
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
12
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
13
reference_url https://usn.ubuntu.com/5980-1/
reference_id USN-5980-1
reference_type
scores
url https://usn.ubuntu.com/5980-1/
14
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
15
reference_url https://usn.ubuntu.com/5985-1/
reference_id USN-5985-1
reference_type
scores
url https://usn.ubuntu.com/5985-1/
16
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
17
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
18
reference_url https://usn.ubuntu.com/6020-1/
reference_id USN-6020-1
reference_type
scores
url https://usn.ubuntu.com/6020-1/
19
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
20
reference_url https://usn.ubuntu.com/6032-1/
reference_id USN-6032-1
reference_type
scores
url https://usn.ubuntu.com/6032-1/
21
reference_url https://usn.ubuntu.com/6151-1/
reference_id USN-6151-1
reference_type
scores
url https://usn.ubuntu.com/6151-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-4382
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-369a-xh7h-9uca
2
url VCID-3ad4-u98h-mqf6
vulnerability_id VCID-3ad4-u98h-mqf6
summary kernel: hid: use-after-free in bigben_set_led()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25012.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25012
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07849
published_at 2026-04-18T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07863
published_at 2026-04-16T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07945
published_at 2026-04-13T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.0796
published_at 2026-04-12T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07902
published_at 2026-04-02T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07978
published_at 2026-04-11T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.0799
published_at 2026-04-09T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07969
published_at 2026-04-08T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07952
published_at 2026-04-04T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07912
published_at 2026-04-07T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08736
published_at 2026-04-24T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08723
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/02/02/1
reference_id 1
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url http://www.openwall.com/lists/oss-security/2023/02/02/1
5
reference_url http://www.openwall.com/lists/oss-security/2023/11/05/1
reference_id 1
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url http://www.openwall.com/lists/oss-security/2023/11/05/1
6
reference_url https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it/
reference_id 20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2172948
reference_id 2172948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2172948
8
reference_url https://seclists.org/oss-sec/2023/q1/53
reference_id 53
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://seclists.org/oss-sec/2023/q1/53
9
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
10
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
11
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
12
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
13
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b
reference_id ?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b
14
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76ca8da989c7d97a7f76c75d475fe95a584439d7
reference_id ?id=76ca8da989c7d97a7f76c75d475fe95a584439d7
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76ca8da989c7d97a7f76c75d475fe95a584439d7
15
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2
reference_id ?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2
16
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
17
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1207560
reference_id show_bug.cgi?id=1207560
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:32Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1207560
18
reference_url https://usn.ubuntu.com/6033-1/
reference_id USN-6033-1
reference_type
scores
url https://usn.ubuntu.com/6033-1/
19
reference_url https://usn.ubuntu.com/6171-1/
reference_id USN-6171-1
reference_type
scores
url https://usn.ubuntu.com/6171-1/
20
reference_url https://usn.ubuntu.com/6172-1/
reference_id USN-6172-1
reference_type
scores
url https://usn.ubuntu.com/6172-1/
21
reference_url https://usn.ubuntu.com/6185-1/
reference_id USN-6185-1
reference_type
scores
url https://usn.ubuntu.com/6185-1/
22
reference_url https://usn.ubuntu.com/6187-1/
reference_id USN-6187-1
reference_type
scores
url https://usn.ubuntu.com/6187-1/
23
reference_url https://usn.ubuntu.com/6207-1/
reference_id USN-6207-1
reference_type
scores
url https://usn.ubuntu.com/6207-1/
24
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
25
reference_url https://usn.ubuntu.com/6223-1/
reference_id USN-6223-1
reference_type
scores
url https://usn.ubuntu.com/6223-1/
26
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2023-25012
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ad4-u98h-mqf6
3
url VCID-4ave-x8wb-f7fw
vulnerability_id VCID-4ave-x8wb-f7fw
summary kernel: insufficient TCP source port randomness leads to client identification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32296.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32296
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16381
published_at 2026-04-24T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16546
published_at 2026-04-12T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16488
published_at 2026-04-13T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16428
published_at 2026-04-16T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16448
published_at 2026-04-18T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16485
published_at 2026-04-21T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16603
published_at 2026-04-02T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16665
published_at 2026-04-04T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16465
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16551
published_at 2026-04-08T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16605
published_at 2026-04-09T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16587
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2096901
reference_id 2096901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2096901
41
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
42
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
43
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
44
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
45
reference_url https://access.redhat.com/errata/RHSA-2026:4128
reference_id RHSA-2026:4128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4128
46
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
47
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
48
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
49
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
50
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
51
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
52
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
53
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
54
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
55
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
56
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
57
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
58
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
59
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
60
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-32296
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ave-x8wb-f7fw
4
url VCID-4gdy-gqe4-93f4
vulnerability_id VCID-4gdy-gqe4-93f4
summary Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3534
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08521
published_at 2026-04-24T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08526
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09364
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09212
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09353
published_at 2026-04-09T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-12T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-02T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09213
published_at 2026-04-16T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09322
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0932
published_at 2026-04-04T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165706
reference_id 2165706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165706
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://vuldb.com/?id.211032
reference_id ?id.211032
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/
url https://vuldb.com/?id.211032
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
reference_id ?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
12
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
13
reference_url https://usn.ubuntu.com/6215-1/
reference_id USN-6215-1
reference_type
scores
url https://usn.ubuntu.com/6215-1/
14
reference_url https://usn.ubuntu.com/USN-5759-2/
reference_id USN-USN-5759-2
reference_type
scores
url https://usn.ubuntu.com/USN-5759-2/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3534
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gdy-gqe4-93f4
5
url VCID-4nqf-ct5y-6uev
vulnerability_id VCID-4nqf-ct5y-6uev
summary kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42896
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.62
published_at 2026-04-24T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61946
published_at 2026-04-04T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61966
published_at 2026-04-08T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.61983
published_at 2026-04-09T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.62004
published_at 2026-04-11T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.61994
published_at 2026-04-12T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.61973
published_at 2026-04-13T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62015
published_at 2026-04-16T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62021
published_at 2026-04-18T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62003
published_at 2026-04-21T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.61916
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42896
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147364
reference_id 2147364
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147364
5
reference_url https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
reference_id #711f8c3fb3db61897080468586b970c87c61d9e4
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/
url https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
6
reference_url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
reference_id 711f8c3fb3db61897080468586b970c87c61d9e4
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:08Z/
url https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
7
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
8
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
9
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
10
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:3461
reference_id RHSA-2023:3461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3461
14
reference_url https://access.redhat.com/errata/RHSA-2023:3462
reference_id RHSA-2023:3462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3462
15
reference_url https://access.redhat.com/errata/RHSA-2023:3517
reference_id RHSA-2023:3517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3517
16
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
17
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
18
reference_url https://access.redhat.com/errata/RHSA-2023:4230
reference_id RHSA-2023:4230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4230
19
reference_url https://access.redhat.com/errata/RHSA-2023:4517
reference_id RHSA-2023:4517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4517
20
reference_url https://access.redhat.com/errata/RHSA-2023:4531
reference_id RHSA-2023:4531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4531
21
reference_url https://access.redhat.com/errata/RHSA-2023:4541
reference_id RHSA-2023:4541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4541
22
reference_url https://access.redhat.com/errata/RHSA-2023:4789
reference_id RHSA-2023:4789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4789
23
reference_url https://access.redhat.com/errata/RHSA-2023:4888
reference_id RHSA-2023:4888
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4888
24
reference_url https://access.redhat.com/errata/RHSA-2023:5580
reference_id RHSA-2023:5580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5580
25
reference_url https://access.redhat.com/errata/RHSA-2023:5588
reference_id RHSA-2023:5588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5588
26
reference_url https://access.redhat.com/errata/RHSA-2023:5589
reference_id RHSA-2023:5589
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5589
27
reference_url https://access.redhat.com/errata/RHSA-2024:0980
reference_id RHSA-2024:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0980
28
reference_url https://access.redhat.com/errata/RHSA-2024:1249
reference_id RHSA-2024:1249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1249
29
reference_url https://access.redhat.com/errata/RHSA-2024:1323
reference_id RHSA-2024:1323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1323
30
reference_url https://access.redhat.com/errata/RHSA-2024:1332
reference_id RHSA-2024:1332
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1332
31
reference_url https://access.redhat.com/errata/RHSA-2024:1746
reference_id RHSA-2024:1746
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1746
32
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
33
reference_url https://usn.ubuntu.com/5783-1/
reference_id USN-5783-1
reference_type
scores
url https://usn.ubuntu.com/5783-1/
34
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
35
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
36
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
37
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
38
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
39
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
40
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
41
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
42
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
43
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
44
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
45
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
46
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
47
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
48
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
49
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
50
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
51
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
52
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
53
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
54
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-42896
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4nqf-ct5y-6uev
6
url VCID-5149-phe6-eqh5
vulnerability_id VCID-5149-phe6-eqh5
summary kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36946
reference_id
reference_type
scores
0
value 0.05077
scoring_system epss
scoring_elements 0.89823
published_at 2026-04-24T12:55:00Z
1
value 0.05077
scoring_system epss
scoring_elements 0.8976
published_at 2026-04-02T12:55:00Z
2
value 0.05077
scoring_system epss
scoring_elements 0.89775
published_at 2026-04-04T12:55:00Z
3
value 0.05077
scoring_system epss
scoring_elements 0.89779
published_at 2026-04-07T12:55:00Z
4
value 0.05077
scoring_system epss
scoring_elements 0.89796
published_at 2026-04-08T12:55:00Z
5
value 0.05077
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-09T12:55:00Z
6
value 0.05077
scoring_system epss
scoring_elements 0.89809
published_at 2026-04-11T12:55:00Z
7
value 0.05077
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-12T12:55:00Z
8
value 0.05077
scoring_system epss
scoring_elements 0.898
published_at 2026-04-13T12:55:00Z
9
value 0.05077
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-18T12:55:00Z
10
value 0.05077
scoring_system epss
scoring_elements 0.89808
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115278
reference_id 2115278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115278
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
reference_id ?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
18
reference_url https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
reference_id ?l=netfilter-devel&m=165883202007292&w=2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
19
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
21
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
22
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
23
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
24
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
25
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
26
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
27
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
28
reference_url https://usn.ubuntu.com/5590-1/
reference_id USN-5590-1
reference_type
scores
url https://usn.ubuntu.com/5590-1/
29
reference_url https://usn.ubuntu.com/5621-1/
reference_id USN-5621-1
reference_type
scores
url https://usn.ubuntu.com/5621-1/
30
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
31
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
32
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
33
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
34
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
35
reference_url https://usn.ubuntu.com/5634-1/
reference_id USN-5634-1
reference_type
scores
url https://usn.ubuntu.com/5634-1/
36
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
37
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
38
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
39
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
40
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
41
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
42
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
43
reference_url https://usn.ubuntu.com/5652-1/
reference_id USN-5652-1
reference_type
scores
url https://usn.ubuntu.com/5652-1/
44
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
45
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
46
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
47
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-36946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5149-phe6-eqh5
7
url VCID-5c6z-1ebs-wfev
vulnerability_id VCID-5c6z-1ebs-wfev
summary kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1012
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53709
published_at 2026-04-01T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53782
published_at 2026-04-08T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53757
published_at 2026-04-04T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53779
published_at 2026-04-09T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53828
published_at 2026-04-11T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53811
published_at 2026-04-12T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53796
published_at 2026-04-13T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53833
published_at 2026-04-16T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53837
published_at 2026-04-18T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.5373
published_at 2026-04-07T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59328
published_at 2026-04-24T12:55:00Z
11
value 0.00388
scoring_system epss
scoring_elements 0.59936
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2064604
reference_id 2064604
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2064604
47
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
48
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
49
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
50
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
51
reference_url https://access.redhat.com/errata/RHSA-2022:5214
reference_id RHSA-2022:5214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5214
52
reference_url https://access.redhat.com/errata/RHSA-2022:5220
reference_id RHSA-2022:5220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5220
53
reference_url https://access.redhat.com/errata/RHSA-2022:5224
reference_id RHSA-2022:5224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5224
54
reference_url https://access.redhat.com/errata/RHSA-2022:5249
reference_id RHSA-2022:5249
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5249
55
reference_url https://access.redhat.com/errata/RHSA-2022:5267
reference_id RHSA-2022:5267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5267
56
reference_url https://access.redhat.com/errata/RHSA-2022:5626
reference_id RHSA-2022:5626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5626
57
reference_url https://access.redhat.com/errata/RHSA-2022:5633
reference_id RHSA-2022:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5633
58
reference_url https://access.redhat.com/errata/RHSA-2022:5636
reference_id RHSA-2022:5636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5636
59
reference_url https://access.redhat.com/errata/RHSA-2022:5819
reference_id RHSA-2022:5819
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5819
60
reference_url https://access.redhat.com/errata/RHSA-2022:5834
reference_id RHSA-2022:5834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5834
61
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
62
reference_url https://usn.ubuntu.com/5471-1/
reference_id USN-5471-1
reference_type
scores
url https://usn.ubuntu.com/5471-1/
63
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
64
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
65
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
66
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
67
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
68
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
69
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
70
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
71
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
72
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
73
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
74
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
75
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
76
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
77
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
78
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
79
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
80
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-1012
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5c6z-1ebs-wfev
8
url VCID-6y4w-3ftc-qkgs
vulnerability_id VCID-6y4w-3ftc-qkgs
summary Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41849.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41849.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41849
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05878
published_at 2026-04-08T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05839
published_at 2026-04-07T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05904
published_at 2026-04-09T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05887
published_at 2026-04-11T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05877
published_at 2026-04-12T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.0587
published_at 2026-04-13T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05835
published_at 2026-04-16T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05846
published_at 2026-04-18T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05809
published_at 2026-04-02T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05845
published_at 2026-04-04T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06283
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07149
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41849
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135327
reference_id 2135327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135327
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
10
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
11
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
12
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
13
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
14
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
15
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
16
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
17
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
18
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
19
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
20
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
21
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
22
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
25
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
26
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
27
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
28
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
29
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
30
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
31
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
32
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
33
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-41849
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6y4w-3ftc-qkgs
9
url VCID-7crw-vbpf-w7dx
vulnerability_id VCID-7crw-vbpf-w7dx
summary kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40768.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40768.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40768
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03106
published_at 2026-04-24T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-21T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03651
published_at 2026-04-13T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.0364
published_at 2026-04-18T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03629
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03691
published_at 2026-04-02T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03703
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03715
published_at 2026-04-07T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03719
published_at 2026-04-08T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03741
published_at 2026-04-09T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03699
published_at 2026-04-11T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03677
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40768
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128462
reference_id 2128462
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128462
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
10
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
11
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
12
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
13
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
14
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
15
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
16
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
17
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
18
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-40768
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7crw-vbpf-w7dx
10
url VCID-7dm1-5xf1-jkf7
vulnerability_id VCID-7dm1-5xf1-jkf7
summary kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3621.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3621
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.3046
published_at 2026-04-24T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30638
published_at 2026-04-21T12:55:00Z
2
value 0.00201
scoring_system epss
scoring_elements 0.42267
published_at 2026-04-12T12:55:00Z
3
value 0.00201
scoring_system epss
scoring_elements 0.42265
published_at 2026-04-18T12:55:00Z
4
value 0.00201
scoring_system epss
scoring_elements 0.42252
published_at 2026-04-02T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.4229
published_at 2026-04-16T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42239
published_at 2026-04-13T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42281
published_at 2026-04-09T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42223
published_at 2026-04-07T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42273
published_at 2026-04-08T12:55:00Z
10
value 0.00201
scoring_system epss
scoring_elements 0.42303
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3621
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3621
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140883
reference_id 2140883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140883
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211920
reference_id ?id.211920
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/
url https://vuldb.com/?id.211920
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856
reference_id ?id=21a87d88c2253350e115029f14fe2a10a7e6c856
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=21a87d88c2253350e115029f14fe2a10a7e6c856
11
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:09Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
13
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
14
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
15
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
16
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
17
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
18
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
19
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
20
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
21
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
22
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
23
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
24
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
25
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
26
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3621
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7dm1-5xf1-jkf7
11
url VCID-7e2m-a86y-c3bd
vulnerability_id VCID-7e2m-a86y-c3bd
summary kernel: media: em28xx: initialize refcount before kref_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-24T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07568
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07542
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07588
published_at 2026-04-21T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07546
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
reference_id 2127985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
14
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
15
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3239
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd
12
url VCID-8834-7b7n-a7f1
vulnerability_id VCID-8834-7b7n-a7f1
summary kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4378
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07917
published_at 2026-04-24T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07958
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.08953
published_at 2026-04-18T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09039
published_at 2026-04-02T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0909
published_at 2026-04-04T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09014
published_at 2026-04-07T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09093
published_at 2026-04-08T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09124
published_at 2026-04-09T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09125
published_at 2026-04-11T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09094
published_at 2026-04-12T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0908
published_at 2026-04-13T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.08975
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://seclists.org/oss-sec/2022/q4/178
reference_id 178
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://seclists.org/oss-sec/2022/q4/178
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152548
reference_id 2152548
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2152548
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
reference_id proc-avoid-integer-type-confusion-in-get_proc_long.patch
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
12
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
reference_id proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-10T14:19:16Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
13
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
14
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
15
reference_url https://access.redhat.com/errata/RHSA-2023:0944
reference_id RHSA-2023:0944
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0944
16
reference_url https://access.redhat.com/errata/RHSA-2023:0945
reference_id RHSA-2023:0945
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0945
17
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
18
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
19
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
20
reference_url https://access.redhat.com/errata/RHSA-2023:1091
reference_id RHSA-2023:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1091
21
reference_url https://access.redhat.com/errata/RHSA-2023:1092
reference_id RHSA-2023:1092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1092
22
reference_url https://access.redhat.com/errata/RHSA-2023:1101
reference_id RHSA-2023:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1101
23
reference_url https://access.redhat.com/errata/RHSA-2023:1103
reference_id RHSA-2023:1103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1103
24
reference_url https://access.redhat.com/errata/RHSA-2023:1109
reference_id RHSA-2023:1109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1109
25
reference_url https://access.redhat.com/errata/RHSA-2023:1110
reference_id RHSA-2023:1110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1110
26
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
27
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
28
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
29
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
30
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
31
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
32
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
33
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
34
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
35
reference_url https://access.redhat.com/errata/RHSA-2023:1705
reference_id RHSA-2023:1705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1705
36
reference_url https://access.redhat.com/errata/RHSA-2023:1706
reference_id RHSA-2023:1706
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1706
37
reference_url https://access.redhat.com/errata/RHSA-2023:1822
reference_id RHSA-2023:1822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1822
38
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
39
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
40
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
41
reference_url https://usn.ubuntu.com/5799-1/
reference_id USN-5799-1
reference_type
scores
url https://usn.ubuntu.com/5799-1/
42
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
43
reference_url https://usn.ubuntu.com/5809-1/
reference_id USN-5809-1
reference_type
scores
url https://usn.ubuntu.com/5809-1/
44
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
45
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
46
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
47
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
48
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
49
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
50
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
51
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
52
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-4378
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8834-7b7n-a7f1
13
url VCID-95yc-p1fc-7kea
vulnerability_id VCID-95yc-p1fc-7kea
summary kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3649.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3649
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21171
published_at 2026-04-08T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-02T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21338
published_at 2026-04-04T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21091
published_at 2026-04-07T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21231
published_at 2026-04-09T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21243
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.212
published_at 2026-04-12T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21987
published_at 2026-04-13T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23831
published_at 2026-04-18T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23812
published_at 2026-04-21T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23842
published_at 2026-04-16T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23692
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3649
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140882
reference_id 2140882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140882
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
10
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
11
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
12
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
13
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
14
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
15
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
16
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
17
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
18
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
19
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
20
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
21
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
22
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
25
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
26
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
27
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
28
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
29
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
30
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
31
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3649
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-95yc-p1fc-7kea
14
url VCID-96bc-a364-8fd5
vulnerability_id VCID-96bc-a364-8fd5
summary kernel: improper input validation in handling of SMB2_TREE_CONNECT command can result in out-of-bounds read which could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47938.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47938.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47938
reference_id
reference_type
scores
0
value 0.02822
scoring_system epss
scoring_elements 0.86118
published_at 2026-04-04T12:55:00Z
1
value 0.02822
scoring_system epss
scoring_elements 0.86102
published_at 2026-04-02T12:55:00Z
2
value 0.02822
scoring_system epss
scoring_elements 0.86136
published_at 2026-04-08T12:55:00Z
3
value 0.02822
scoring_system epss
scoring_elements 0.86117
published_at 2026-04-07T12:55:00Z
4
value 0.02822
scoring_system epss
scoring_elements 0.86148
published_at 2026-04-09T12:55:00Z
5
value 0.04907
scoring_system epss
scoring_elements 0.89604
published_at 2026-04-13T12:55:00Z
6
value 0.04907
scoring_system epss
scoring_elements 0.8961
published_at 2026-04-12T12:55:00Z
7
value 0.04907
scoring_system epss
scoring_elements 0.89611
published_at 2026-04-11T12:55:00Z
8
value 0.06103
scoring_system epss
scoring_elements 0.90814
published_at 2026-04-24T12:55:00Z
9
value 0.06103
scoring_system epss
scoring_elements 0.90805
published_at 2026-04-16T12:55:00Z
10
value 0.06103
scoring_system epss
scoring_elements 0.90803
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47938
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2022/12/23/10
reference_id 10
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/
url http://www.openwall.com/lists/oss-security/2022/12/23/10
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155947
reference_id 2155947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155947
5
reference_url https://github.com/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e
reference_id 824d4f64c20093275f72fc8101394d75ff6a249e
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/
url https://github.com/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
reference_id ChangeLog-5.19.2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
11
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=824d4f64c20093275f72fc8101394d75ff6a249e
reference_id ?id=824d4f64c20093275f72fc8101394d75ff6a249e
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=824d4f64c20093275f72fc8101394d75ff6a249e
12
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1689/
reference_id ZDI-22-1689
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T03:19:29Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1689/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47938
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96bc-a364-8fd5
15
url VCID-98b2-bte2-wfd3
vulnerability_id VCID-98b2-bte2-wfd3
summary kernel: A flaw in unix_sock_destructor/unix_release_sock in net/unix/af_unix.c leads to memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3543.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3543
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28643
published_at 2026-04-24T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28807
published_at 2026-04-13T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28828
published_at 2026-04-16T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28804
published_at 2026-04-18T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28754
published_at 2026-04-21T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.2893
published_at 2026-04-02T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28979
published_at 2026-04-04T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28786
published_at 2026-04-07T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28854
published_at 2026-04-08T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28895
published_at 2026-04-09T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.289
published_at 2026-04-11T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28857
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3543
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161185
reference_id 2161185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161185
3
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
4
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
5
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
6
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
7
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
8
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
9
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
10
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
11
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
12
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
13
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
14
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3543
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-98b2-bte2-wfd3
16
url VCID-9e8s-d6bj-kba4
vulnerability_id VCID-9e8s-d6bj-kba4
summary kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41850.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41850.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41850
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06658
published_at 2026-04-24T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0649
published_at 2026-04-16T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06497
published_at 2026-04-18T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06647
published_at 2026-04-21T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.0691
published_at 2026-04-13T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06807
published_at 2026-04-02T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06855
published_at 2026-04-04T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06841
published_at 2026-04-07T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06896
published_at 2026-04-08T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06926
published_at 2026-04-09T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06922
published_at 2026-04-11T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06914
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41850
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2131378
reference_id 2131378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2131378
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
10
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
11
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
12
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
13
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
14
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
15
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
16
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
17
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
18
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
19
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
20
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
21
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
22
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
25
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
26
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
27
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
28
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
29
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
30
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
31
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
32
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
33
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-41850
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9e8s-d6bj-kba4
17
url VCID-9mam-pneh-5yhy
vulnerability_id VCID-9mam-pneh-5yhy
summary kernel: nfsd buffer overflow by RPC message over TCP with garbage data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43945.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43945
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55864
published_at 2026-04-24T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55921
published_at 2026-04-04T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.5595
published_at 2026-04-08T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55952
published_at 2026-04-09T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55961
published_at 2026-04-11T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55942
published_at 2026-04-12T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55923
published_at 2026-04-13T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.5596
published_at 2026-04-16T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55963
published_at 2026-04-18T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55938
published_at 2026-04-21T12:55:00Z
10
value 0.00329
scoring_system epss
scoring_elements 0.55899
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43945
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38612
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38637
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40974
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006
126
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
127
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2141752
reference_id 2141752
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2141752
128
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
129
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
130
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
131
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
132
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
reference_id ?id=f90497a16e434c2211c66e3de8e77b17868382b8
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
133
reference_url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_id Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/
url http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
134
reference_url https://security.netapp.com/advisory/ntap-20221215-0006/
reference_id ntap-20221215-0006
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-01T19:08:01Z/
url https://security.netapp.com/advisory/ntap-20221215-0006/
135
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
136
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
137
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
138
reference_url https://access.redhat.com/errata/RHSA-2023:0300
reference_id RHSA-2023:0300
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0300
139
reference_url https://access.redhat.com/errata/RHSA-2023:0334
reference_id RHSA-2023:0334
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0334
140
reference_url https://access.redhat.com/errata/RHSA-2023:0348
reference_id RHSA-2023:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0348
141
reference_url https://access.redhat.com/errata/RHSA-2023:0832
reference_id RHSA-2023:0832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0832
142
reference_url https://access.redhat.com/errata/RHSA-2023:0839
reference_id RHSA-2023:0839
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0839
143
reference_url https://access.redhat.com/errata/RHSA-2023:0854
reference_id RHSA-2023:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0854
144
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
145
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
146
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
147
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
148
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
149
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
150
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
151
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
152
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
153
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
154
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
155
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
156
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
157
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
158
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
159
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
160
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
161
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
162
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
163
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-43945
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mam-pneh-5yhy
18
url VCID-agq2-bq7w-33d1
vulnerability_id VCID-agq2-bq7w-33d1
summary Guests can trigger deadlock in Linux netback driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42329.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42329
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03769
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03781
published_at 2026-04-04T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07888
published_at 2026-04-08T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.0783
published_at 2026-04-07T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08489
published_at 2026-04-24T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.085
published_at 2026-04-09T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08494
published_at 2026-04-11T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08474
published_at 2026-04-12T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08461
published_at 2026-04-13T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08353
published_at 2026-04-16T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08337
published_at 2026-04-18T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08495
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42329
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42329
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2022/12/08/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/
url http://www.openwall.com/lists/oss-security/2022/12/08/2
5
reference_url http://www.openwall.com/lists/oss-security/2022/12/09/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/
url http://www.openwall.com/lists/oss-security/2022/12/09/2
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156215
reference_id 2156215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156215
7
reference_url http://www.openwall.com/lists/oss-security/2022/12/08/3
reference_id 3
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/
url http://www.openwall.com/lists/oss-security/2022/12/08/3
8
reference_url https://xenbits.xenproject.org/xsa/advisory-424.txt
reference_id advisory-424.txt
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/
url https://xenbits.xenproject.org/xsa/advisory-424.txt
9
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
10
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
11
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
12
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
13
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
14
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:23:34Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
15
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
16
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
17
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
18
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
19
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
20
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
21
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
22
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
23
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
24
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
25
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
26
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
27
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
28
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
29
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
30
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
33
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
34
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
35
reference_url https://xenbits.xen.org/xsa/advisory-424.html
reference_id XSA-424
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-424.html
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-42329
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agq2-bq7w-33d1
19
url VCID-ap5s-w9uk-zff3
vulnerability_id VCID-ap5s-w9uk-zff3
summary kernel: nfp: use-after-free in area_cache_get()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3545
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04244
published_at 2026-04-24T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04157
published_at 2026-04-12T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04131
published_at 2026-04-13T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-16T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.0411
published_at 2026-04-18T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04232
published_at 2026-04-21T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04114
published_at 2026-04-02T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04133
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04149
published_at 2026-04-07T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04181
published_at 2026-04-08T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04195
published_at 2026-04-09T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04174
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161310
reference_id 2161310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161310
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2024:0439
reference_id RHSA-2024:0439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0439
22
reference_url https://access.redhat.com/errata/RHSA-2024:0448
reference_id RHSA-2024:0448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0448
23
reference_url https://access.redhat.com/errata/RHSA-2024:0461
reference_id RHSA-2024:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0461
24
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
25
reference_url https://access.redhat.com/errata/RHSA-2024:0881
reference_id RHSA-2024:0881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0881
26
reference_url https://access.redhat.com/errata/RHSA-2024:0897
reference_id RHSA-2024:0897
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0897
27
reference_url https://access.redhat.com/errata/RHSA-2024:1250
reference_id RHSA-2024:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1250
28
reference_url https://access.redhat.com/errata/RHSA-2024:1268
reference_id RHSA-2024:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1268
29
reference_url https://access.redhat.com/errata/RHSA-2024:1269
reference_id RHSA-2024:1269
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1269
30
reference_url https://access.redhat.com/errata/RHSA-2024:1306
reference_id RHSA-2024:1306
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1306
31
reference_url https://access.redhat.com/errata/RHSA-2024:1367
reference_id RHSA-2024:1367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1367
32
reference_url https://access.redhat.com/errata/RHSA-2024:1382
reference_id RHSA-2024:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1382
33
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
34
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
35
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
36
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
37
reference_url https://usn.ubuntu.com/5911-1/
reference_id USN-5911-1
reference_type
scores
url https://usn.ubuntu.com/5911-1/
38
reference_url https://usn.ubuntu.com/5912-1/
reference_id USN-5912-1
reference_type
scores
url https://usn.ubuntu.com/5912-1/
39
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
40
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
41
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
42
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
43
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
44
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
45
reference_url https://usn.ubuntu.com/5929-1/
reference_id USN-5929-1
reference_type
scores
url https://usn.ubuntu.com/5929-1/
46
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
47
reference_url https://usn.ubuntu.com/5935-1/
reference_id USN-5935-1
reference_type
scores
url https://usn.ubuntu.com/5935-1/
48
reference_url https://usn.ubuntu.com/5938-1/
reference_id USN-5938-1
reference_type
scores
url https://usn.ubuntu.com/5938-1/
49
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
50
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
51
reference_url https://usn.ubuntu.com/5941-1/
reference_id USN-5941-1
reference_type
scores
url https://usn.ubuntu.com/5941-1/
52
reference_url https://usn.ubuntu.com/5950-1/
reference_id USN-5950-1
reference_type
scores
url https://usn.ubuntu.com/5950-1/
53
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
54
reference_url https://usn.ubuntu.com/5962-1/
reference_id USN-5962-1
reference_type
scores
url https://usn.ubuntu.com/5962-1/
55
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
56
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
57
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3545
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap5s-w9uk-zff3
20
url VCID-b87y-f2rd-2fg7
vulnerability_id VCID-b87y-f2rd-2fg7
summary kernel: NFS over RDMA random memory leakage
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0812.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0812
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38669
published_at 2026-04-01T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.38544
published_at 2026-04-24T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38783
published_at 2026-04-12T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.38755
published_at 2026-04-13T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38801
published_at 2026-04-16T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38779
published_at 2026-04-18T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.387
published_at 2026-04-21T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38797
published_at 2026-04-02T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38818
published_at 2026-04-04T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38746
published_at 2026-04-07T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38796
published_at 2026-04-08T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.38807
published_at 2026-04-09T12:55:00Z
12
value 0.00174
scoring_system epss
scoring_elements 0.38819
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2058955
reference_id 2058955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2058955
41
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
42
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
43
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
44
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
45
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
46
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
47
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
48
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
49
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
50
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
51
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-0812
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b87y-f2rd-2fg7
21
url VCID-bp6k-v3c5-gudy
vulnerability_id VCID-bp6k-v3c5-gudy
summary kernel: LoadPin bypass via dm-verity table reload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00202
published_at 2026-04-24T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00194
published_at 2026-04-07T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00197
published_at 2026-04-18T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00193
published_at 2026-04-09T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00195
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
reference_id 2177862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
reference_id GHSA-6vq3-w69p-w63m
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
10
reference_url https://security.netapp.com/advisory/ntap-20230214-0005/
reference_id ntap-20230214-0005
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://security.netapp.com/advisory/ntap-20230214-0005/
11
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
15
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
16
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
17
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
18
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
19
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
20
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
21
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
22
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
23
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
24
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
25
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
26
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
27
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
28
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
29
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-2503
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy
22
url VCID-bt6z-fyxn-ckgt
vulnerability_id VCID-bt6z-fyxn-ckgt
summary kernel: use after in tst_timer in drivers/atm/idt77252.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3635.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3635
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01816
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01742
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01756
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01759
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01768
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01762
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01752
published_at 2026-04-12T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.0175
published_at 2026-04-13T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.0174
published_at 2026-04-18T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01825
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2148458
reference_id 2148458
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2148458
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211934
reference_id ?id.211934
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:17Z/
url https://vuldb.com/?id.211934
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=3f4093e2bf4673f218c0bf17d8362337c400e77b
reference_id ?id=3f4093e2bf4673f218c0bf17d8362337c400e77b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:17Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=3f4093e2bf4673f218c0bf17d8362337c400e77b
11
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:17Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
12
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
13
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
14
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
15
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
16
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
17
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
18
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
19
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
20
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
21
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3635
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bt6z-fyxn-ckgt
23
url VCID-ckqp-r5m2-j3fx
vulnerability_id VCID-ckqp-r5m2-j3fx
summary kernel: data races around sk->sk_prot
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3567
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06395
published_at 2026-04-07T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0641
published_at 2026-04-18T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.064
published_at 2026-04-16T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06463
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-12T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06443
published_at 2026-04-08T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06487
published_at 2026-04-09T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.068
published_at 2026-04-24T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06615
published_at 2026-04-02T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06659
published_at 2026-04-04T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06792
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143943
reference_id 2143943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143943
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211090
reference_id ?id.211090
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/
url https://vuldb.com/?id.211090
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
reference_id ?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:29Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
17
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
18
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
19
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
20
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
21
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
22
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
23
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
24
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
25
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
26
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
27
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
28
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
29
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
30
reference_url https://usn.ubuntu.com/5914-1/
reference_id USN-5914-1
reference_type
scores
url https://usn.ubuntu.com/5914-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3567
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckqp-r5m2-j3fx
24
url VCID-cs99-jacq-qkey
vulnerability_id VCID-cs99-jacq-qkey
summary kernel: use-after-free in l1oip timer handlers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3565
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06808
published_at 2026-04-24T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06725
published_at 2026-04-12T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06717
published_at 2026-04-13T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06654
published_at 2026-04-16T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-18T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06801
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06626
published_at 2026-04-02T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.0667
published_at 2026-04-04T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.0665
published_at 2026-04-07T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06699
published_at 2026-04-08T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06734
published_at 2026-04-09T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06732
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150953
reference_id 2150953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150953
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
10
reference_url https://access.redhat.com/errata/RHSA-2024:2950
reference_id RHSA-2024:2950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2950
11
reference_url https://access.redhat.com/errata/RHSA-2024:3138
reference_id RHSA-2024:3138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3138
12
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
13
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
14
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
15
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
16
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
17
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
18
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
19
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
20
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
21
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
22
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
23
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
24
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3565
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cs99-jacq-qkey
25
url VCID-d14e-jv1a-w7d3
vulnerability_id VCID-d14e-jv1a-w7d3
summary kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3619
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07596
published_at 2026-04-24T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07606
published_at 2026-04-08T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07625
published_at 2026-04-09T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07624
published_at 2026-04-11T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07611
published_at 2026-04-12T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07597
published_at 2026-04-13T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07521
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0751
published_at 2026-04-18T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07649
published_at 2026-04-21T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.0753
published_at 2026-04-02T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.0757
published_at 2026-04-04T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07547
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3619
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2154235
reference_id 2154235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2154235
4
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
5
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
6
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
7
reference_url https://vuldb.com/?id.211918
reference_id ?id.211918
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/
url https://vuldb.com/?id.211918
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
reference_id ?id=97097c85c088e11651146da32a4e1cdb9dfa6193
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T16:59:20Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
14
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
15
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
16
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
17
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
18
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
19
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
20
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
21
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d14e-jv1a-w7d3
26
url VCID-d79b-qtu3-hud8
vulnerability_id VCID-d79b-qtu3-hud8
summary kernel: use-after-free bug in mctp_sk_unhash in net/mctp/af_mctp.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3977.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3977.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3977
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28328
published_at 2026-04-24T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28481
published_at 2026-04-07T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28546
published_at 2026-04-08T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28586
published_at 2026-04-09T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28588
published_at 2026-04-11T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28544
published_at 2026-04-12T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28495
published_at 2026-04-13T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.2851
published_at 2026-04-16T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28488
published_at 2026-04-18T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28441
published_at 2026-04-21T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28631
published_at 2026-04-02T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28675
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3977
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142371
reference_id 2142371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142371
4
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
5
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
6
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
7
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89
reference_id ?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-08T18:03:11Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3a732b46736cd8a29092e4b0b1a9ba83e672bf89
9
reference_url https://security.netapp.com/advisory/ntap-20230223-0005/
reference_id ntap-20230223-0005
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-08T18:03:11Z/
url https://security.netapp.com/advisory/ntap-20230223-0005/
10
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
11
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
12
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
13
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3977
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d79b-qtu3-hud8
27
url VCID-dqhd-grev-t3ge
vulnerability_id VCID-dqhd-grev-t3ge
summary kernel: use-after-free related to leaf anon_vma double reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42703
reference_id
reference_type
scores
0
value 0.00985
scoring_system epss
scoring_elements 0.76899
published_at 2026-04-24T12:55:00Z
1
value 0.00985
scoring_system epss
scoring_elements 0.76833
published_at 2026-04-12T12:55:00Z
2
value 0.00985
scoring_system epss
scoring_elements 0.76827
published_at 2026-04-13T12:55:00Z
3
value 0.00985
scoring_system epss
scoring_elements 0.7687
published_at 2026-04-16T12:55:00Z
4
value 0.00985
scoring_system epss
scoring_elements 0.76875
published_at 2026-04-18T12:55:00Z
5
value 0.00985
scoring_system epss
scoring_elements 0.76866
published_at 2026-04-21T12:55:00Z
6
value 0.00985
scoring_system epss
scoring_elements 0.76773
published_at 2026-04-02T12:55:00Z
7
value 0.00985
scoring_system epss
scoring_elements 0.76802
published_at 2026-04-04T12:55:00Z
8
value 0.00985
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-07T12:55:00Z
9
value 0.00985
scoring_system epss
scoring_elements 0.76814
published_at 2026-04-08T12:55:00Z
10
value 0.00985
scoring_system epss
scoring_elements 0.76824
published_at 2026-04-09T12:55:00Z
11
value 0.00985
scoring_system epss
scoring_elements 0.76853
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42703
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133483
reference_id 2133483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133483
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:1091
reference_id RHSA-2023:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1091
10
reference_url https://access.redhat.com/errata/RHSA-2023:1092
reference_id RHSA-2023:1092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1092
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
16
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
17
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
21
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
22
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
23
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
24
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
25
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
26
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
27
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
28
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
29
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
30
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
31
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
32
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
33
reference_url https://usn.ubuntu.com/5916-1/
reference_id USN-5916-1
reference_type
scores
url https://usn.ubuntu.com/5916-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-42703
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-grev-t3ge
28
url VCID-dqth-c54y-e7fb
vulnerability_id VCID-dqth-c54y-e7fb
summary kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3566
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06857
published_at 2026-04-07T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06853
published_at 2026-04-18T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06869
published_at 2026-04-16T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-13T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06934
published_at 2026-04-12T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06942
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06912
published_at 2026-04-08T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06943
published_at 2026-04-09T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07161
published_at 2026-04-24T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-02T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07111
published_at 2026-04-04T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07191
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2143893
reference_id 2143893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2143893
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211089
reference_id ?id.211089
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/
url https://vuldb.com/?id.211089
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
reference_id ?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
16
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
17
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
18
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
19
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
20
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
21
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
22
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
23
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
24
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
25
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
26
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
27
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
28
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
29
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3566
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqth-c54y-e7fb
29
url VCID-ejj4-yt8j-c7fm
vulnerability_id VCID-ejj4-yt8j-c7fm
summary kernel: race condition in xfrm_probe_algs can lead to OOB read/write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3028
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01263
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01259
published_at 2026-04-21T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-13T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02045
published_at 2026-04-18T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02032
published_at 2026-04-16T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02077
published_at 2026-04-02T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-04T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02078
published_at 2026-04-07T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-08T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02098
published_at 2026-04-09T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02075
published_at 2026-04-11T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.0206
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3028
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122228
reference_id 2122228
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122228
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
10
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
14
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
15
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
16
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
17
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
18
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
19
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
20
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
21
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
22
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
23
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3028
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejj4-yt8j-c7fm
30
url VCID-ensk-7dvm-p7g7
vulnerability_id VCID-ensk-7dvm-p7g7
summary kernel: an out-of-bounds vulnerability in i2c-ismt driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2873
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12202
published_at 2026-04-24T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12256
published_at 2026-04-12T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12219
published_at 2026-04-13T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-16T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12113
published_at 2026-04-18T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12224
published_at 2026-04-21T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.1231
published_at 2026-04-02T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12358
published_at 2026-04-04T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12156
published_at 2026-04-07T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12235
published_at 2026-04-08T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12285
published_at 2026-04-09T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12293
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2873
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119048
reference_id 2119048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119048
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2023:0832
reference_id RHSA-2023:0832
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0832
22
reference_url https://access.redhat.com/errata/RHSA-2023:0854
reference_id RHSA-2023:0854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0854
23
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
24
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
25
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
26
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
27
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
28
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
29
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
30
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-2873
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ensk-7dvm-p7g7
31
url VCID-eyzv-gxvw-9kee
vulnerability_id VCID-eyzv-gxvw-9kee
summary kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c may lead to crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34495.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34495
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16554
published_at 2026-04-24T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16726
published_at 2026-04-12T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16669
published_at 2026-04-13T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16606
published_at 2026-04-16T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16614
published_at 2026-04-18T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16652
published_at 2026-04-21T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16809
published_at 2026-04-02T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16866
published_at 2026-04-04T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16651
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16736
published_at 2026-04-08T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.1679
published_at 2026-04-09T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.1677
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34495
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2102218
reference_id 2102218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2102218
4
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
5
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
6
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
7
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
8
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
9
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
10
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
11
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
12
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
13
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
14
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
15
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
16
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
17
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-34495
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyzv-gxvw-9kee
32
url VCID-g2k9-eds7-6qe3
vulnerability_id VCID-g2k9-eds7-6qe3
summary kernel: memory corruption in usbmon driver
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43750
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19108
published_at 2026-04-21T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19101
published_at 2026-04-18T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19091
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19187
published_at 2026-04-12T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-11T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21138
published_at 2026-04-24T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21351
published_at 2026-04-02T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21406
published_at 2026-04-04T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21158
published_at 2026-04-07T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21237
published_at 2026-04-08T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21299
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2151270
reference_id 2151270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2151270
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:1987
reference_id RHSA-2023:1987
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1987
10
reference_url https://access.redhat.com/errata/RHSA-2023:1988
reference_id RHSA-2023:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1988
11
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
12
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
13
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
14
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
15
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
18
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
19
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
20
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
21
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
22
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
23
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
24
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
25
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
26
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
27
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
28
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
29
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
30
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
31
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
32
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
33
reference_url https://usn.ubuntu.com/5913-1/
reference_id USN-5913-1
reference_type
scores
url https://usn.ubuntu.com/5913-1/
34
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
37
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-43750
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2k9-eds7-6qe3
33
url VCID-g8j3-3ky8-h7av
vulnerability_id VCID-g8j3-3ky8-h7av
summary kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2153
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03579
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03593
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-24T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06171
published_at 2026-04-16T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06182
published_at 2026-04-18T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-21T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06657
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06563
published_at 2026-04-07T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06613
published_at 2026-04-08T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06648
published_at 2026-04-11T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06641
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069736
reference_id 2069736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069736
41
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
42
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
43
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
44
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
45
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
46
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
47
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
48
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
49
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
50
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
51
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
52
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
53
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
54
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-2153
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8j3-3ky8-h7av
34
url VCID-hnf3-a64g-3yba
vulnerability_id VCID-hnf3-a64g-3yba
summary kernel: Improper update of reference count in io_uring leads to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3910.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3910.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3910
reference_id
reference_type
scores
0
value 0.00638
scoring_system epss
scoring_elements 0.70587
published_at 2026-04-24T12:55:00Z
1
value 0.00638
scoring_system epss
scoring_elements 0.70474
published_at 2026-04-04T12:55:00Z
2
value 0.00638
scoring_system epss
scoring_elements 0.70452
published_at 2026-04-07T12:55:00Z
3
value 0.00638
scoring_system epss
scoring_elements 0.70498
published_at 2026-04-08T12:55:00Z
4
value 0.00638
scoring_system epss
scoring_elements 0.70513
published_at 2026-04-09T12:55:00Z
5
value 0.00638
scoring_system epss
scoring_elements 0.70537
published_at 2026-04-21T12:55:00Z
6
value 0.00638
scoring_system epss
scoring_elements 0.70521
published_at 2026-04-12T12:55:00Z
7
value 0.00638
scoring_system epss
scoring_elements 0.70507
published_at 2026-04-13T12:55:00Z
8
value 0.00638
scoring_system epss
scoring_elements 0.7055
published_at 2026-04-16T12:55:00Z
9
value 0.00638
scoring_system epss
scoring_elements 0.70559
published_at 2026-04-18T12:55:00Z
10
value 0.00638
scoring_system epss
scoring_elements 0.70456
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3910
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2144960
reference_id 2144960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2144960
4
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
5
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
6
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
7
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
8
reference_url https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679
reference_id #fc7222c3a9f56271fba02aabbfbae999042f1679
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:05Z/
url https://kernel.dance/#fc7222c3a9f56271fba02aabbfbae999042f1679
9
reference_url https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
reference_id fc7222c3a9f56271fba02aabbfbae999042f1679
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:37:05Z/
url https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
10
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
11
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
12
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
13
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3910
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnf3-a64g-3yba
35
url VCID-hxzu-828c-3qfx
vulnerability_id VCID-hxzu-828c-3qfx
summary kernel: use after free bug in spl2sw_nvmem_get_mac_address
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3541.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3541
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.25938
published_at 2026-04-24T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26051
published_at 2026-04-13T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26054
published_at 2026-04-16T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26033
published_at 2026-04-18T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.25999
published_at 2026-04-21T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26216
published_at 2026-04-02T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26256
published_at 2026-04-04T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26028
published_at 2026-04-07T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26094
published_at 2026-04-08T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26146
published_at 2026-04-09T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26155
published_at 2026-04-11T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.2611
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3541
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168174
reference_id 2168174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168174
3
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
4
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
5
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
6
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
7
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
8
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
9
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
10
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3541
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxzu-828c-3qfx
36
url VCID-j8ze-t6w6-ekak
vulnerability_id VCID-j8ze-t6w6-ekak
summary kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21296
published_at 2026-04-24T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21444
published_at 2026-04-21T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22822
published_at 2026-04-16T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22816
published_at 2026-04-18T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22829
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22902
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22865
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22918
published_at 2026-04-02T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-04T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
reference_id 2147356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2147356
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id #b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
10
reference_url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_id b1a2cd50c0357f243b7435a732b4e62ba3157a2e
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:36:47Z/
url https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
11
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
12
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
13
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
14
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
15
reference_url https://access.redhat.com/errata/RHSA-2024:2621
reference_id RHSA-2024:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2621
16
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
17
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
18
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
19
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
20
reference_url https://usn.ubuntu.com/5858-1/
reference_id USN-5858-1
reference_type
scores
url https://usn.ubuntu.com/5858-1/
21
reference_url https://usn.ubuntu.com/5859-1/
reference_id USN-5859-1
reference_type
scores
url https://usn.ubuntu.com/5859-1/
22
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
23
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
24
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
25
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
26
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
27
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
28
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
29
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
30
reference_url https://usn.ubuntu.com/5884-1/
reference_id USN-5884-1
reference_type
scores
url https://usn.ubuntu.com/5884-1/
31
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
32
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
33
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
34
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
37
reference_url https://usn.ubuntu.com/5926-1/
reference_id USN-5926-1
reference_type
scores
url https://usn.ubuntu.com/5926-1/
38
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
39
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
40
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-42895
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8ze-t6w6-ekak
37
url VCID-jefe-c9nd-ufc1
vulnerability_id VCID-jefe-c9nd-ufc1
summary kernel: USB-accessible buffer overflow in brcmfmac
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3628
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.2055
published_at 2026-04-24T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20767
published_at 2026-04-09T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20785
published_at 2026-04-11T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20742
published_at 2026-04-12T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-13T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20675
published_at 2026-04-16T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20671
published_at 2026-04-18T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20663
published_at 2026-04-21T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20858
published_at 2026-04-02T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20916
published_at 2026-04-04T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.2063
published_at 2026-04-07T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20706
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150960
reference_id 2150960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150960
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
reference_id fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-08T14:15:33Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
10
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
11
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
12
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
13
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
14
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
15
reference_url https://usn.ubuntu.com/5780-1/
reference_id USN-5780-1
reference_type
scores
url https://usn.ubuntu.com/5780-1/
16
reference_url https://usn.ubuntu.com/5850-1/
reference_id USN-5850-1
reference_type
scores
url https://usn.ubuntu.com/5850-1/
17
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
18
reference_url https://usn.ubuntu.com/5853-1/
reference_id USN-5853-1
reference_type
scores
url https://usn.ubuntu.com/5853-1/
19
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
20
reference_url https://usn.ubuntu.com/5874-1/
reference_id USN-5874-1
reference_type
scores
url https://usn.ubuntu.com/5874-1/
21
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
22
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/5878-1/
reference_id USN-5878-1
reference_type
scores
url https://usn.ubuntu.com/5878-1/
25
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
26
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
27
reference_url https://usn.ubuntu.com/5909-1/
reference_id USN-5909-1
reference_type
scores
url https://usn.ubuntu.com/5909-1/
28
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
29
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
30
reference_url https://usn.ubuntu.com/5920-1/
reference_id USN-5920-1
reference_type
scores
url https://usn.ubuntu.com/5920-1/
31
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
32
reference_url https://usn.ubuntu.com/5925-1/
reference_id USN-5925-1
reference_type
scores
url https://usn.ubuntu.com/5925-1/
33
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
34
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
35
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
36
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
37
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
38
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
39
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3628
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jefe-c9nd-ufc1
38
url VCID-jw25-6cs7-dkev
vulnerability_id VCID-jw25-6cs7-dkev
summary Kernel: A flaw in damon_sysfs_add_target in mm/damon/sysfs.c in Netfilter leads to memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3544.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3544.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3544
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05293
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04968
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04914
published_at 2026-04-16T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04925
published_at 2026-04-18T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05257
published_at 2026-04-21T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05115
published_at 2026-04-02T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05144
published_at 2026-04-04T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04975
published_at 2026-04-07T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05009
published_at 2026-04-08T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05025
published_at 2026-04-09T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05006
published_at 2026-04-11T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.04987
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3544
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161210
reference_id 2161210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161210
4
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
5
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
6
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
7
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
8
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
9
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
10
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3544
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw25-6cs7-dkev
39
url VCID-kf7y-k2px-uug5
vulnerability_id VCID-kf7y-k2px-uug5
summary kernel: net scheduler use-after-free information disclosure vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3586.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3586
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17043
published_at 2026-04-24T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17138
published_at 2026-04-21T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18712
published_at 2026-04-11T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18566
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18852
published_at 2026-04-04T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18572
published_at 2026-04-07T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18651
published_at 2026-04-08T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18706
published_at 2026-04-09T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18663
published_at 2026-04-12T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18799
published_at 2026-04-02T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18557
published_at 2026-04-16T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18613
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3586
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124475
reference_id 2124475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124475
5
reference_url https://github.com/torvalds/linux/commit/9efd23297cca
reference_id 9efd23297cca
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T14:48:08Z/
url https://github.com/torvalds/linux/commit/9efd23297cca
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T14:48:08Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
11
reference_url https://www.zerodayinitiative.com/advisories/upcoming/
reference_id upcoming
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-09T14:48:08Z/
url https://www.zerodayinitiative.com/advisories/upcoming/
12
reference_url https://usn.ubuntu.com/5790-1/
reference_id USN-5790-1
reference_type
scores
url https://usn.ubuntu.com/5790-1/
13
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
14
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
15
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
16
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
17
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
18
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
19
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
20
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
21
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
22
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
23
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
24
reference_url https://usn.ubuntu.com/6045-1/
reference_id USN-6045-1
reference_type
scores
url https://usn.ubuntu.com/6045-1/
25
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
26
reference_url https://usn.ubuntu.com/6124-1/
reference_id USN-6124-1
reference_type
scores
url https://usn.ubuntu.com/6124-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3586
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kf7y-k2px-uug5
40
url VCID-n2c4-w748-tyau
vulnerability_id VCID-n2c4-w748-tyau
summary kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3623
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22872
published_at 2026-04-24T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23234
published_at 2026-04-04T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23023
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23096
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23168
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.2313
published_at 2026-04-12T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23073
published_at 2026-04-13T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23088
published_at 2026-04-16T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23079
published_at 2026-04-18T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.23042
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165721
reference_id 2165721
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165721
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://www.debian.org/security/2023/dsa-5324
22
reference_url https://vuldb.com/?id.211921
reference_id ?id.211921
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://vuldb.com/?id.211921
23
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
reference_id ?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=fac35ba763ed07ba93154c95ffc0c4a55023707f
24
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:04Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
31
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
32
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
33
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
34
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
35
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
36
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
37
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
38
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
39
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
40
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
41
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
42
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
43
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2c4-w748-tyau
41
url VCID-ng25-c2xk-9fem
vulnerability_id VCID-ng25-c2xk-9fem
summary kernel: NULL pointer dereference in traffic control subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47929.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47929
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08699
published_at 2026-04-24T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08685
published_at 2026-04-21T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09521
published_at 2026-04-04T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.0942
published_at 2026-04-18T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09472
published_at 2026-04-02T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09419
published_at 2026-04-16T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09525
published_at 2026-04-13T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09541
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.0957
published_at 2026-04-11T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09556
published_at 2026-04-09T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09508
published_at 2026-04-08T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09434
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168246
reference_id 2168246
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168246
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
reference_id ChangeLog-6.1.6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
22
reference_url https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
reference_id components.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
23
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://www.debian.org/security/2023/dsa-5324
24
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
reference_id ?id=96398560f26aa07e8f2969d73c8197e6a6d10407
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
25
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
26
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
27
reference_url https://www.spinics.net/lists/netdev/msg555705.html
reference_id msg555705.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:00:53Z/
url https://www.spinics.net/lists/netdev/msg555705.html
28
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
29
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
30
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
31
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
32
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
33
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
34
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
37
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
38
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
39
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
40
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
41
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
42
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
43
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
44
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
45
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
46
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
47
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
48
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
49
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
50
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
51
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
52
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
53
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
54
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
55
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
56
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
57
reference_url https://usn.ubuntu.com/6248-1/
reference_id USN-6248-1
reference_type
scores
url https://usn.ubuntu.com/6248-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47929
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ng25-c2xk-9fem
42
url VCID-np7t-cj38-m3a7
vulnerability_id VCID-np7t-cj38-m3a7
summary Guests can trigger NIC interface reset/abort/crash via netback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3643.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3643
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-24T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25318
published_at 2026-04-11T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.25277
published_at 2026-04-12T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25224
published_at 2026-04-18T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25234
published_at 2026-04-16T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25206
published_at 2026-04-21T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.2538
published_at 2026-04-02T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25416
published_at 2026-04-04T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25193
published_at 2026-04-07T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25262
published_at 2026-04-08T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25307
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3643
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2158198
reference_id 2158198
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2158198
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://usn.ubuntu.com/5794-1/
reference_id USN-5794-1
reference_type
scores
url https://usn.ubuntu.com/5794-1/
10
reference_url https://usn.ubuntu.com/5802-1/
reference_id USN-5802-1
reference_type
scores
url https://usn.ubuntu.com/5802-1/
11
reference_url https://usn.ubuntu.com/5803-1/
reference_id USN-5803-1
reference_type
scores
url https://usn.ubuntu.com/5803-1/
12
reference_url https://usn.ubuntu.com/5804-1/
reference_id USN-5804-1
reference_type
scores
url https://usn.ubuntu.com/5804-1/
13
reference_url https://usn.ubuntu.com/5804-2/
reference_id USN-5804-2
reference_type
scores
url https://usn.ubuntu.com/5804-2/
14
reference_url https://usn.ubuntu.com/5808-1/
reference_id USN-5808-1
reference_type
scores
url https://usn.ubuntu.com/5808-1/
15
reference_url https://usn.ubuntu.com/5813-1/
reference_id USN-5813-1
reference_type
scores
url https://usn.ubuntu.com/5813-1/
16
reference_url https://usn.ubuntu.com/5814-1/
reference_id USN-5814-1
reference_type
scores
url https://usn.ubuntu.com/5814-1/
17
reference_url https://usn.ubuntu.com/5829-1/
reference_id USN-5829-1
reference_type
scores
url https://usn.ubuntu.com/5829-1/
18
reference_url https://usn.ubuntu.com/5830-1/
reference_id USN-5830-1
reference_type
scores
url https://usn.ubuntu.com/5830-1/
19
reference_url https://usn.ubuntu.com/5831-1/
reference_id USN-5831-1
reference_type
scores
url https://usn.ubuntu.com/5831-1/
20
reference_url https://usn.ubuntu.com/5832-1/
reference_id USN-5832-1
reference_type
scores
url https://usn.ubuntu.com/5832-1/
21
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
22
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
23
reference_url https://usn.ubuntu.com/5863-1/
reference_id USN-5863-1
reference_type
scores
url https://usn.ubuntu.com/5863-1/
24
reference_url https://usn.ubuntu.com/5875-1/
reference_id USN-5875-1
reference_type
scores
url https://usn.ubuntu.com/5875-1/
25
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
26
reference_url https://usn.ubuntu.com/5879-1/
reference_id USN-5879-1
reference_type
scores
url https://usn.ubuntu.com/5879-1/
27
reference_url https://usn.ubuntu.com/5918-1/
reference_id USN-5918-1
reference_type
scores
url https://usn.ubuntu.com/5918-1/
28
reference_url https://xenbits.xen.org/xsa/advisory-423.html
reference_id XSA-423
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-423.html
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3643
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-np7t-cj38-m3a7
43
url VCID-pphs-rtxe-wfca
vulnerability_id VCID-pphs-rtxe-wfca
summary kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25131
published_at 2026-04-24T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25302
published_at 2026-04-11T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.2526
published_at 2026-04-12T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25207
published_at 2026-04-18T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25217
published_at 2026-04-16T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-21T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25362
published_at 2026-04-02T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25398
published_at 2026-04-04T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.25174
published_at 2026-04-07T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25243
published_at 2026-04-08T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25288
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
reference_id 2150999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2150999
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2023:0856
reference_id RHSA-2023:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0856
10
reference_url https://access.redhat.com/errata/RHSA-2023:0858
reference_id RHSA-2023:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0858
11
reference_url https://access.redhat.com/errata/RHSA-2023:0951
reference_id RHSA-2023:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0951
12
reference_url https://access.redhat.com/errata/RHSA-2023:0979
reference_id RHSA-2023:0979
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0979
13
reference_url https://access.redhat.com/errata/RHSA-2023:1008
reference_id RHSA-2023:1008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1008
14
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
15
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
16
reference_url https://access.redhat.com/errata/RHSA-2023:1220
reference_id RHSA-2023:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1220
17
reference_url https://access.redhat.com/errata/RHSA-2023:1221
reference_id RHSA-2023:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1221
18
reference_url https://access.redhat.com/errata/RHSA-2023:1251
reference_id RHSA-2023:1251
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1251
19
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
20
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
21
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
22
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
23
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
24
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
25
reference_url https://access.redhat.com/errata/RHSA-2023:3277
reference_id RHSA-2023:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3277
26
reference_url https://access.redhat.com/errata/RHSA-2023:3278
reference_id RHSA-2023:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3278
27
reference_url https://access.redhat.com/errata/RHSA-2023:3388
reference_id RHSA-2023:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3388
28
reference_url https://access.redhat.com/errata/RHSA-2023:3431
reference_id RHSA-2023:3431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3431
29
reference_url https://access.redhat.com/errata/RHSA-2023:3491
reference_id RHSA-2023:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3491
30
reference_url https://access.redhat.com/errata/RHSA-2023:4020
reference_id RHSA-2023:4020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4020
31
reference_url https://access.redhat.com/errata/RHSA-2023:4021
reference_id RHSA-2023:4021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4021
32
reference_url https://access.redhat.com/errata/RHSA-2023:4150
reference_id RHSA-2023:4150
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4150
33
reference_url https://access.redhat.com/errata/RHSA-2023:4151
reference_id RHSA-2023:4151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4151
34
reference_url https://access.redhat.com/errata/RHSA-2023:4215
reference_id RHSA-2023:4215
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4215
35
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
36
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
37
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
38
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
39
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
40
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
41
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
42
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
43
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
44
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
45
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
46
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
47
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
48
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3564
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pphs-rtxe-wfca
44
url VCID-pqzm-vutm-hkhn
vulnerability_id VCID-pqzm-vutm-hkhn
summary Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39842.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39842
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00535
published_at 2026-04-08T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00547
published_at 2026-04-02T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.0054
published_at 2026-04-04T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00538
published_at 2026-04-07T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.0053
published_at 2026-04-09T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00532
published_at 2026-04-11T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00529
published_at 2026-04-12T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00743
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00747
published_at 2026-04-18T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00791
published_at 2026-04-21T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00792
published_at 2026-04-24T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.00728
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39842
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2124470
reference_id 2124470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2124470
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
26
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
27
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
28
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
29
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
30
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
31
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
32
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
33
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
34
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
35
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
36
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
37
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
38
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
39
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-39842
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqzm-vutm-hkhn
45
url VCID-qare-c6yz-d3bt
vulnerability_id VCID-qare-c6yz-d3bt
summary kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34494.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-34494
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18266
published_at 2026-04-24T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18431
published_at 2026-04-12T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.1838
published_at 2026-04-13T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18325
published_at 2026-04-16T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.1834
published_at 2026-04-18T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18365
published_at 2026-04-21T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.1858
published_at 2026-04-02T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18635
published_at 2026-04-04T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18344
published_at 2026-04-07T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18427
published_at 2026-04-08T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18479
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-34494
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2102205
reference_id 2102205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2102205
4
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
5
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
6
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
7
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
8
reference_url https://usn.ubuntu.com/5517-1/
reference_id USN-5517-1
reference_type
scores
url https://usn.ubuntu.com/5517-1/
9
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
10
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
11
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
12
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
13
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
14
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
15
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
16
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
17
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
18
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-34494
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qare-c6yz-d3bt
46
url VCID-qbd9-czms-8qdn
vulnerability_id VCID-qbd9-czms-8qdn
summary kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36280
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15295
published_at 2026-04-24T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15345
published_at 2026-04-12T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15281
published_at 2026-04-13T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15195
published_at 2026-04-16T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15201
published_at 2026-04-18T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15255
published_at 2026-04-21T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15413
published_at 2026-04-02T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15482
published_at 2026-04-04T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15285
published_at 2026-04-07T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15373
published_at 2026-04-08T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15423
published_at 2026-04-09T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15384
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2133450
reference_id 2133450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2133450
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
22
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
23
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
24
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
25
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
26
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
27
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
28
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
29
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
30
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
33
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
34
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
35
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
36
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
37
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
38
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
39
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
40
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
41
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
42
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
43
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
44
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
45
reference_url https://usn.ubuntu.com/6032-1/
reference_id USN-6032-1
reference_type
scores
url https://usn.ubuntu.com/6032-1/
46
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
47
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
48
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-36280
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbd9-czms-8qdn
47
url VCID-qgxx-2pek-nydy
vulnerability_id VCID-qgxx-2pek-nydy
summary kernel: use-after-free in efi_capsule_write in capsule-loader.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40307.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40307.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-40307
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.0377
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03767
published_at 2026-04-21T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07802
published_at 2026-04-13T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07692
published_at 2026-04-18T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07716
published_at 2026-04-16T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07754
published_at 2026-04-02T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07799
published_at 2026-04-04T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07758
published_at 2026-04-07T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07818
published_at 2026-04-08T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07833
published_at 2026-04-09T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07828
published_at 2026-04-11T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07816
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-40307
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2127424
reference_id 2127424
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2127424
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://usn.ubuntu.com/5790-1/
reference_id USN-5790-1
reference_type
scores
url https://usn.ubuntu.com/5790-1/
26
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
27
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
28
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
29
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
30
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
31
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
32
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
33
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
34
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
35
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
36
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
37
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-40307
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgxx-2pek-nydy
48
url VCID-qkam-j6uv-n7fj
vulnerability_id VCID-qkam-j6uv-n7fj
summary kernel: NULL pointer dereference in rawv6_push_pending_frames
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0394
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06335
published_at 2026-04-24T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06318
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06941
published_at 2026-04-11T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06852
published_at 2026-04-18T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06869
published_at 2026-04-16T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.0693
published_at 2026-04-13T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.0687
published_at 2026-04-04T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06857
published_at 2026-04-07T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06912
published_at 2026-04-08T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06942
published_at 2026-04-09T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06934
published_at 2026-04-12T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06827
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162120
reference_id 2162120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162120
17
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
18
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
19
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
20
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
21
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
reference_id ?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
22
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
23
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
24
reference_url https://security.netapp.com/advisory/ntap-20230302-0005/
reference_id ntap-20230302-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T14:47:25Z/
url https://security.netapp.com/advisory/ntap-20230302-0005/
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
31
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
32
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
33
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
34
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
35
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
36
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
37
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
38
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
39
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
40
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
41
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
42
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
43
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
44
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
45
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
46
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
47
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
48
reference_url https://usn.ubuntu.com/6025-1/
reference_id USN-6025-1
reference_type
scores
url https://usn.ubuntu.com/6025-1/
49
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
50
reference_url https://usn.ubuntu.com/6040-1/
reference_id USN-6040-1
reference_type
scores
url https://usn.ubuntu.com/6040-1/
51
reference_url https://usn.ubuntu.com/6057-1/
reference_id USN-6057-1
reference_type
scores
url https://usn.ubuntu.com/6057-1/
52
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
53
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
54
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
55
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2023-0394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qkam-j6uv-n7fj
49
url VCID-qu2u-k7ak-4qbb
vulnerability_id VCID-qu2u-k7ak-4qbb
summary kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3646.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3646
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28617
published_at 2026-04-13T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28665
published_at 2026-04-12T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28709
published_at 2026-04-11T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28707
published_at 2026-04-09T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28746
published_at 2026-04-02T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28667
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28794
published_at 2026-04-04T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28601
published_at 2026-04-07T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-24T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31667
published_at 2026-04-16T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31645
published_at 2026-04-18T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31613
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3646
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155501
reference_id 2155501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155501
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211961
reference_id ?id.211961
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/
url https://vuldb.com/?id.211961
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d51a97063db4704a5ef6bc978dddab1636a306
reference_id ?id=d0d51a97063db4704a5ef6bc978dddab1636a306
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d51a97063db4704a5ef6bc978dddab1636a306
11
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:39Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
13
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
14
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
15
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
16
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
17
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
18
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
19
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
20
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
21
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
22
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
23
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
24
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
25
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
26
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
27
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
28
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
29
reference_url https://usn.ubuntu.com/5919-1/
reference_id USN-5919-1
reference_type
scores
url https://usn.ubuntu.com/5919-1/
30
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
31
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
32
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
33
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
34
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
35
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
36
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3646
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qu2u-k7ak-4qbb
50
url VCID-r4pv-ac7b-aufb
vulnerability_id VCID-r4pv-ac7b-aufb
summary ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0266.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0266
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26922
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26864
published_at 2026-04-09T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26816
published_at 2026-04-08T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26747
published_at 2026-04-07T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26958
published_at 2026-04-04T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36347
published_at 2026-04-24T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36662
published_at 2026-04-11T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36627
published_at 2026-04-12T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36602
published_at 2026-04-13T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36648
published_at 2026-04-16T12:55:00Z
10
value 0.00158
scoring_system epss
scoring_elements 0.3663
published_at 2026-04-18T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36571
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0266
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2163379
reference_id 2163379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2163379
17
reference_url https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e
reference_id 56b88b50565cd8b946a2d00b0c83927b7ebb055e
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://github.com/torvalds/linux/commit/56b88b50565cd8b946a2d00b0c83927b7ebb055e
18
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
reference_id alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch?id=72783cf35e6c55bca84c4bb7b776c58152856fd4
19
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
20
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
21
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
22
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
23
reference_url https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
reference_id becf9e5d553c2389d857a3c178ce80fdb34a02e1
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://github.com/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
24
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 7.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T15:07:49Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
25
reference_url https://access.redhat.com/errata/RHSA-2023:1202
reference_id RHSA-2023:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1202
26
reference_url https://access.redhat.com/errata/RHSA-2023:1203
reference_id RHSA-2023:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1203
27
reference_url https://access.redhat.com/errata/RHSA-2023:1435
reference_id RHSA-2023:1435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1435
28
reference_url https://access.redhat.com/errata/RHSA-2023:1469
reference_id RHSA-2023:1469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1469
29
reference_url https://access.redhat.com/errata/RHSA-2023:1470
reference_id RHSA-2023:1470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1470
30
reference_url https://access.redhat.com/errata/RHSA-2023:1471
reference_id RHSA-2023:1471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1471
31
reference_url https://access.redhat.com/errata/RHSA-2023:1554
reference_id RHSA-2023:1554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1554
32
reference_url https://access.redhat.com/errata/RHSA-2023:1556
reference_id RHSA-2023:1556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1556
33
reference_url https://access.redhat.com/errata/RHSA-2023:1557
reference_id RHSA-2023:1557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1557
34
reference_url https://access.redhat.com/errata/RHSA-2023:1559
reference_id RHSA-2023:1559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1559
35
reference_url https://access.redhat.com/errata/RHSA-2023:1560
reference_id RHSA-2023:1560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1560
36
reference_url https://access.redhat.com/errata/RHSA-2023:1566
reference_id RHSA-2023:1566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1566
37
reference_url https://access.redhat.com/errata/RHSA-2023:1584
reference_id RHSA-2023:1584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1584
38
reference_url https://access.redhat.com/errata/RHSA-2023:1588
reference_id RHSA-2023:1588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1588
39
reference_url https://access.redhat.com/errata/RHSA-2023:1590
reference_id RHSA-2023:1590
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1590
40
reference_url https://access.redhat.com/errata/RHSA-2023:1659
reference_id RHSA-2023:1659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1659
41
reference_url https://access.redhat.com/errata/RHSA-2023:1660
reference_id RHSA-2023:1660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1660
42
reference_url https://access.redhat.com/errata/RHSA-2023:1662
reference_id RHSA-2023:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1662
43
reference_url https://access.redhat.com/errata/RHSA-2023:1666
reference_id RHSA-2023:1666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1666
44
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
45
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
46
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
47
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
48
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
49
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
50
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
51
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
52
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
53
reference_url https://usn.ubuntu.com/5970-1/
reference_id USN-5970-1
reference_type
scores
url https://usn.ubuntu.com/5970-1/
54
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
55
reference_url https://usn.ubuntu.com/5979-1/
reference_id USN-5979-1
reference_type
scores
url https://usn.ubuntu.com/5979-1/
56
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
57
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
58
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
59
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
60
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
61
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
62
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
63
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
64
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2023-0266
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4pv-ac7b-aufb
51
url VCID-s3tt-1m91-afar
vulnerability_id VCID-s3tt-1m91-afar
summary kernel: smb2_write() fails to validate user supplied data which can result in out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47940.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47940
reference_id
reference_type
scores
0
value 0.00245
scoring_system epss
scoring_elements 0.47775
published_at 2026-04-09T12:55:00Z
1
value 0.00245
scoring_system epss
scoring_elements 0.47778
published_at 2026-04-08T12:55:00Z
2
value 0.00245
scoring_system epss
scoring_elements 0.47755
published_at 2026-04-02T12:55:00Z
3
value 0.00245
scoring_system epss
scoring_elements 0.47724
published_at 2026-04-07T12:55:00Z
4
value 0.00898
scoring_system epss
scoring_elements 0.75644
published_at 2026-04-13T12:55:00Z
5
value 0.00898
scoring_system epss
scoring_elements 0.75651
published_at 2026-04-12T12:55:00Z
6
value 0.00898
scoring_system epss
scoring_elements 0.75669
published_at 2026-04-11T12:55:00Z
7
value 0.01523
scoring_system epss
scoring_elements 0.81327
published_at 2026-04-24T12:55:00Z
8
value 0.01523
scoring_system epss
scoring_elements 0.81304
published_at 2026-04-16T12:55:00Z
9
value 0.01523
scoring_system epss
scoring_elements 0.81306
published_at 2026-04-18T12:55:00Z
10
value 0.01523
scoring_system epss
scoring_elements 0.81305
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47940
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2022/12/23/10
reference_id 10
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/
url http://www.openwall.com/lists/oss-security/2022/12/23/10
4
reference_url https://github.com/torvalds/linux/commit/158a66b245739e15858de42c0ba60fcf3de9b8e6
reference_id 158a66b245739e15858de42c0ba60fcf3de9b8e6
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/
url https://github.com/torvalds/linux/commit/158a66b245739e15858de42c0ba60fcf3de9b8e6
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155944
reference_id 2155944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155944
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
reference_id ChangeLog-5.18.18
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.18
11
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=158a66b245739e15858de42c0ba60fcf3de9b8e6
reference_id ?id=158a66b245739e15858de42c0ba60fcf3de9b8e6
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:56:12Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=158a66b245739e15858de42c0ba60fcf3de9b8e6
12
reference_url https://usn.ubuntu.com/5851-1/
reference_id USN-5851-1
reference_type
scores
url https://usn.ubuntu.com/5851-1/
13
reference_url https://usn.ubuntu.com/5860-1/
reference_id USN-5860-1
reference_type
scores
url https://usn.ubuntu.com/5860-1/
14
reference_url https://usn.ubuntu.com/5876-1/
reference_id USN-5876-1
reference_type
scores
url https://usn.ubuntu.com/5876-1/
15
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47940
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3tt-1m91-afar
52
url VCID-sv4s-h2k7-aygu
vulnerability_id VCID-sv4s-h2k7-aygu
summary kernel: Report vmalloc UAF in dvb-core/dmxdev
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41218
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62301
published_at 2026-04-24T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62204
published_at 2026-04-02T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-04T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62201
published_at 2026-04-07T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.6225
published_at 2026-04-08T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62268
published_at 2026-04-09T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62286
published_at 2026-04-11T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62276
published_at 2026-04-12T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62254
published_at 2026-04-13T12:55:00Z
9
value 0.00426
scoring_system epss
scoring_elements 0.62299
published_at 2026-04-16T12:55:00Z
10
value 0.00426
scoring_system epss
scoring_elements 0.62307
published_at 2026-04-18T12:55:00Z
11
value 0.00426
scoring_system epss
scoring_elements 0.62291
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url http://www.openwall.com/lists/oss-security/2022/09/24/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url http://www.openwall.com/lists/oss-security/2022/09/24/1
17
reference_url http://www.openwall.com/lists/oss-security/2022/09/24/2
reference_id 2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url http://www.openwall.com/lists/oss-security/2022/09/24/2
18
reference_url https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
reference_id 20220908132754.30532-1-tiwai%40suse.de
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122960
reference_id 2122960
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122960
20
reference_url http://www.openwall.com/lists/oss-security/2022/09/23/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url http://www.openwall.com/lists/oss-security/2022/09/23/4
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c
reference_id dmxdev.c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c
26
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://www.debian.org/security/2023/dsa-5324
27
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
reference_id ?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
28
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
29
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:28:21Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
30
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
31
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
32
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
33
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
34
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
35
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
36
reference_url https://usn.ubuntu.com/5927-1/
reference_id USN-5927-1
reference_type
scores
url https://usn.ubuntu.com/5927-1/
37
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
38
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
39
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
40
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
41
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
42
reference_url https://usn.ubuntu.com/5981-1/
reference_id USN-5981-1
reference_type
scores
url https://usn.ubuntu.com/5981-1/
43
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
44
reference_url https://usn.ubuntu.com/5984-1/
reference_id USN-5984-1
reference_type
scores
url https://usn.ubuntu.com/5984-1/
45
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
46
reference_url https://usn.ubuntu.com/5991-1/
reference_id USN-5991-1
reference_type
scores
url https://usn.ubuntu.com/5991-1/
47
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
48
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
49
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
50
reference_url https://usn.ubuntu.com/6009-1/
reference_id USN-6009-1
reference_type
scores
url https://usn.ubuntu.com/6009-1/
51
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
52
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
53
reference_url https://usn.ubuntu.com/6024-1/
reference_id USN-6024-1
reference_type
scores
url https://usn.ubuntu.com/6024-1/
54
reference_url https://usn.ubuntu.com/6030-1/
reference_id USN-6030-1
reference_type
scores
url https://usn.ubuntu.com/6030-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-41218
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv4s-h2k7-aygu
53
url VCID-sybh-ybu8-mfhv
vulnerability_id VCID-sybh-ybu8-mfhv
summary kernel: handling of SMB2_NEGOTIATE command doesn't properly release memory which could result in DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47941.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47941
reference_id
reference_type
scores
0
value 0.00423
scoring_system epss
scoring_elements 0.62109
published_at 2026-04-04T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62076
published_at 2026-04-02T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62127
published_at 2026-04-08T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62077
published_at 2026-04-07T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62145
published_at 2026-04-09T12:55:00Z
5
value 0.01541
scoring_system epss
scoring_elements 0.81368
published_at 2026-04-13T12:55:00Z
6
value 0.01541
scoring_system epss
scoring_elements 0.81376
published_at 2026-04-12T12:55:00Z
7
value 0.01541
scoring_system epss
scoring_elements 0.8139
published_at 2026-04-11T12:55:00Z
8
value 0.02667
scoring_system epss
scoring_elements 0.85843
published_at 2026-04-24T12:55:00Z
9
value 0.02667
scoring_system epss
scoring_elements 0.85822
published_at 2026-04-16T12:55:00Z
10
value 0.02667
scoring_system epss
scoring_elements 0.85826
published_at 2026-04-18T12:55:00Z
11
value 0.02667
scoring_system epss
scoring_elements 0.8582
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47941
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2022/12/23/10
reference_id 10
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/
url http://www.openwall.com/lists/oss-security/2022/12/23/10
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155945
reference_id 2155945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155945
5
reference_url https://github.com/torvalds/linux/commit/aa7253c2393f6dcd6a1468b0792f6da76edad917
reference_id aa7253c2393f6dcd6a1468b0792f6da76edad917
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/
url https://github.com/torvalds/linux/commit/aa7253c2393f6dcd6a1468b0792f6da76edad917
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
reference_id ChangeLog-5.19.2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
11
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa7253c2393f6dcd6a1468b0792f6da76edad917
reference_id ?id=aa7253c2393f6dcd6a1468b0792f6da76edad917
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa7253c2393f6dcd6a1468b0792f6da76edad917
12
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1687/
reference_id ZDI-22-1687
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:58:23Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1687/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47941
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sybh-ybu8-mfhv
54
url VCID-t81u-wyws-r7c3
vulnerability_id VCID-t81u-wyws-r7c3
summary kernel: Rate limit overflow messages in r8152 in intr_callback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3594
reference_id
reference_type
scores
0
value 0.002
scoring_system epss
scoring_elements 0.41958
published_at 2026-04-24T12:55:00Z
1
value 0.002
scoring_system epss
scoring_elements 0.42075
published_at 2026-04-02T12:55:00Z
2
value 0.002
scoring_system epss
scoring_elements 0.42103
published_at 2026-04-04T12:55:00Z
3
value 0.002
scoring_system epss
scoring_elements 0.4204
published_at 2026-04-07T12:55:00Z
4
value 0.002
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-08T12:55:00Z
5
value 0.002
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-09T12:55:00Z
6
value 0.002
scoring_system epss
scoring_elements 0.42127
published_at 2026-04-11T12:55:00Z
7
value 0.002
scoring_system epss
scoring_elements 0.42089
published_at 2026-04-18T12:55:00Z
8
value 0.002
scoring_system epss
scoring_elements 0.42064
published_at 2026-04-13T12:55:00Z
9
value 0.002
scoring_system epss
scoring_elements 0.42115
published_at 2026-04-16T12:55:00Z
10
value 0.002
scoring_system epss
scoring_elements 0.42018
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2149024
reference_id 2149024
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2149024
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://vuldb.com/?id.211363
reference_id ?id.211363
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://vuldb.com/?id.211363
10
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
reference_id ?id=93e2be344a7db169b7119de21ac1bf253b8c6907
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
11
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
reference_id msg00031.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-11T20:53:55Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
13
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
14
reference_url https://access.redhat.com/errata/RHSA-2023:6901
reference_id RHSA-2023:6901
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6901
15
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
16
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
17
reference_url https://access.redhat.com/errata/RHSA-2024:1404
reference_id RHSA-2024:1404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1404
18
reference_url https://usn.ubuntu.com/5754-1/
reference_id USN-5754-1
reference_type
scores
url https://usn.ubuntu.com/5754-1/
19
reference_url https://usn.ubuntu.com/5754-2/
reference_id USN-5754-2
reference_type
scores
url https://usn.ubuntu.com/5754-2/
20
reference_url https://usn.ubuntu.com/5755-1/
reference_id USN-5755-1
reference_type
scores
url https://usn.ubuntu.com/5755-1/
21
reference_url https://usn.ubuntu.com/5755-2/
reference_id USN-5755-2
reference_type
scores
url https://usn.ubuntu.com/5755-2/
22
reference_url https://usn.ubuntu.com/5756-1/
reference_id USN-5756-1
reference_type
scores
url https://usn.ubuntu.com/5756-1/
23
reference_url https://usn.ubuntu.com/5756-2/
reference_id USN-5756-2
reference_type
scores
url https://usn.ubuntu.com/5756-2/
24
reference_url https://usn.ubuntu.com/5756-3/
reference_id USN-5756-3
reference_type
scores
url https://usn.ubuntu.com/5756-3/
25
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
26
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
27
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
28
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
29
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
30
reference_url https://usn.ubuntu.com/5779-1/
reference_id USN-5779-1
reference_type
scores
url https://usn.ubuntu.com/5779-1/
31
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3594
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t81u-wyws-r7c3
55
url VCID-v4c7-7k4y-ebf6
vulnerability_id VCID-v4c7-7k4y-ebf6
summary kernel: NVME driver: null pointer dereference in drivers/nvme/target/auth.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0122.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0122
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36499
published_at 2026-04-24T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36872
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36903
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36737
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36788
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36804
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36813
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36778
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36753
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36797
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.3678
published_at 2026-04-18T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.36721
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0122
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2023/01/18/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:50:28Z/
url http://www.openwall.com/lists/oss-security/2023/01/18/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2157927
reference_id 2157927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2157927
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168
reference_id ?id=da0342a3aa0357795224e6283df86444e1117168
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:50:28Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da0342a3aa0357795224e6283df86444e1117168
10
reference_url https://security.netapp.com/advisory/ntap-20230302-0002/
reference_id ntap-20230302-0002
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-04T18:50:28Z/
url https://security.netapp.com/advisory/ntap-20230302-0002/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2023-0122
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v4c7-7k4y-ebf6
56
url VCID-vmbf-nbfs-5bbb
vulnerability_id VCID-vmbf-nbfs-5bbb
summary kernel: slab-out-of-bounds read vulnerabilities in cbq_classify
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23454.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23454
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11323
published_at 2026-04-24T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11383
published_at 2026-04-21T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.1861
published_at 2026-04-07T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18609
published_at 2026-04-18T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18597
published_at 2026-04-16T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18652
published_at 2026-04-13T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18701
published_at 2026-04-12T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18748
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18743
published_at 2026-04-09T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18889
published_at 2026-04-04T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18689
published_at 2026-04-08T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18836
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23454
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://www.openwall.com/lists/oss-security/2023/01/10/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://www.openwall.com/lists/oss-security/2023/01/10/1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168297
reference_id 2168297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168297
18
reference_url https://www.openwall.com/lists/oss-security/2023/01/10/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://www.openwall.com/lists/oss-security/2023/01/10/4
19
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
20
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
21
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
22
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
23
reference_url https://www.debian.org/security/2023/dsa-5324
reference_id dsa-5324
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://www.debian.org/security/2023/dsa-5324
24
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
reference_id ?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
25
reference_url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
26
reference_url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
reference_id msg00006.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:34Z/
url https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
30
reference_url https://usn.ubuntu.com/5915-1/
reference_id USN-5915-1
reference_type
scores
url https://usn.ubuntu.com/5915-1/
31
reference_url https://usn.ubuntu.com/5917-1/
reference_id USN-5917-1
reference_type
scores
url https://usn.ubuntu.com/5917-1/
32
reference_url https://usn.ubuntu.com/5934-1/
reference_id USN-5934-1
reference_type
scores
url https://usn.ubuntu.com/5934-1/
33
reference_url https://usn.ubuntu.com/5939-1/
reference_id USN-5939-1
reference_type
scores
url https://usn.ubuntu.com/5939-1/
34
reference_url https://usn.ubuntu.com/5940-1/
reference_id USN-5940-1
reference_type
scores
url https://usn.ubuntu.com/5940-1/
35
reference_url https://usn.ubuntu.com/5951-1/
reference_id USN-5951-1
reference_type
scores
url https://usn.ubuntu.com/5951-1/
36
reference_url https://usn.ubuntu.com/5982-1/
reference_id USN-5982-1
reference_type
scores
url https://usn.ubuntu.com/5982-1/
37
reference_url https://usn.ubuntu.com/5987-1/
reference_id USN-5987-1
reference_type
scores
url https://usn.ubuntu.com/5987-1/
38
reference_url https://usn.ubuntu.com/6000-1/
reference_id USN-6000-1
reference_type
scores
url https://usn.ubuntu.com/6000-1/
39
reference_url https://usn.ubuntu.com/6004-1/
reference_id USN-6004-1
reference_type
scores
url https://usn.ubuntu.com/6004-1/
40
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
41
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
42
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2023-23454
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmbf-nbfs-5bbb
57
url VCID-vrmr-8pda-m3d8
vulnerability_id VCID-vrmr-8pda-m3d8
summary Kernel: A use after free in __mtk_ppe_check_skb in drivers/net/ethernet/mediatek/mtk_ppe.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3636.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3636
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06209
published_at 2026-04-07T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06239
published_at 2026-04-18T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-16T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06268
published_at 2026-04-13T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06279
published_at 2026-04-12T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06282
published_at 2026-04-11T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06251
published_at 2026-04-08T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06292
published_at 2026-04-09T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06588
published_at 2026-04-24T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.0639
published_at 2026-04-02T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06419
published_at 2026-04-04T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06571
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3636
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2180984
reference_id 2180984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2180984
4
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
5
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
6
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
7
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
8
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=17a5f6a78dc7b8db385de346092d7d9f9dc24df6
reference_id ?id=17a5f6a78dc7b8db385de346092d7d9f9dc24df6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:51Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/pabeni/net-next.git/commit/?id=17a5f6a78dc7b8db385de346092d7d9f9dc24df6
9
reference_url https://vuldb.com/?id.211935
reference_id ?id.211935
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:07:51Z/
url https://vuldb.com/?id.211935
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3636
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrmr-8pda-m3d8
58
url VCID-vu3z-hmu8-fkbn
vulnerability_id VCID-vu3z-hmu8-fkbn
summary kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3606
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05311
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04988
published_at 2026-04-07T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05021
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05037
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05018
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04999
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.0498
published_at 2026-04-13T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04926
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04936
published_at 2026-04-18T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-21T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05137
published_at 2026-04-02T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05163
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155196
reference_id 2155196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155196
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://vuldb.com/?id.211749
reference_id ?id.211749
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/
url https://vuldb.com/?id.211749
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
reference_id ?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
12
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
13
reference_url https://usn.ubuntu.com/6215-1/
reference_id USN-6215-1
reference_type
scores
url https://usn.ubuntu.com/6215-1/
14
reference_url https://usn.ubuntu.com/USN-5759-2/
reference_id USN-USN-5759-2
reference_type
scores
url https://usn.ubuntu.com/USN-5759-2/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3606
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3z-hmu8-fkbn
59
url VCID-vzpr-mm8p-yygx
vulnerability_id VCID-vzpr-mm8p-yygx
summary kernel: netfilter: nf_conntrack_irc message handling issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2663
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39049
published_at 2026-04-24T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39345
published_at 2026-04-12T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39327
published_at 2026-04-13T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39379
published_at 2026-04-16T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39351
published_at 2026-04-18T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39264
published_at 2026-04-21T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39363
published_at 2026-04-02T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-04T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.393
published_at 2026-04-07T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39356
published_at 2026-04-08T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39373
published_at 2026-04-09T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39385
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123056
reference_id 2123056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123056
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
26
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
27
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
28
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
29
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
30
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
31
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
32
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
33
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
34
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
35
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
36
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
37
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
38
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
39
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
40
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
41
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
42
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
43
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
44
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
45
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
46
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
47
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
48
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
49
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
50
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
51
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
52
reference_url https://usn.ubuntu.com/6247-1/
reference_id USN-6247-1
reference_type
scores
url https://usn.ubuntu.com/6247-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-2663
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzpr-mm8p-yygx
60
url VCID-wmbn-me38-gbaf
vulnerability_id VCID-wmbn-me38-gbaf
summary kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3061.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3061.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3061
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06591
published_at 2026-04-24T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06574
published_at 2026-04-21T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07237
published_at 2026-04-13T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07163
published_at 2026-04-18T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07169
published_at 2026-04-16T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07158
published_at 2026-04-02T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07204
published_at 2026-04-04T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07184
published_at 2026-04-07T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07238
published_at 2026-04-08T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07264
published_at 2026-04-09T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07261
published_at 2026-04-11T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07247
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3061
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2122526
reference_id 2122526
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2122526
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://usn.ubuntu.com/5790-1/
reference_id USN-5790-1
reference_type
scores
url https://usn.ubuntu.com/5790-1/
26
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
27
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
28
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
29
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
30
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
31
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
32
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
33
reference_url https://usn.ubuntu.com/5976-1/
reference_id USN-5976-1
reference_type
scores
url https://usn.ubuntu.com/5976-1/
34
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
35
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
36
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3061
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmbn-me38-gbaf
61
url VCID-xdyu-fbfb-huh1
vulnerability_id VCID-xdyu-fbfb-huh1
summary kernel: smb2_tree_disconnect() fails to validate object existance prior to performing opertions on it
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47939.json
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47939
reference_id
reference_type
scores
0
value 0.00641
scoring_system epss
scoring_elements 0.70648
published_at 2026-04-24T12:55:00Z
1
value 0.01132
scoring_system epss
scoring_elements 0.7836
published_at 2026-04-18T12:55:00Z
2
value 0.01132
scoring_system epss
scoring_elements 0.78362
published_at 2026-04-16T12:55:00Z
3
value 0.0114
scoring_system epss
scoring_elements 0.78409
published_at 2026-04-09T12:55:00Z
4
value 0.0114
scoring_system epss
scoring_elements 0.78362
published_at 2026-04-02T12:55:00Z
5
value 0.0114
scoring_system epss
scoring_elements 0.7841
published_at 2026-04-13T12:55:00Z
6
value 0.0114
scoring_system epss
scoring_elements 0.78418
published_at 2026-04-12T12:55:00Z
7
value 0.0114
scoring_system epss
scoring_elements 0.78435
published_at 2026-04-11T12:55:00Z
8
value 0.0114
scoring_system epss
scoring_elements 0.78393
published_at 2026-04-04T12:55:00Z
9
value 0.0114
scoring_system epss
scoring_elements 0.78377
published_at 2026-04-07T12:55:00Z
10
value 0.0114
scoring_system epss
scoring_elements 0.78404
published_at 2026-04-08T12:55:00Z
11
value 0.01163
scoring_system epss
scoring_elements 0.78631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47939
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2022/12/23/10
reference_id 10
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/
url http://www.openwall.com/lists/oss-security/2022/12/23/10
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155943
reference_id 2155943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155943
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://github.com/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
reference_id cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/
url https://github.com/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
10
reference_url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
reference_id ChangeLog-5.19.2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/
url https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
11
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
reference_id ?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
12
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1690/
reference_id ZDI-22-1690
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1690/
13
reference_url https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/
reference_id zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T18:38:17Z/
url https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47939
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xdyu-fbfb-huh1
62
url VCID-xpn4-e2aq-f3d7
vulnerability_id VCID-xpn4-e2aq-f3d7
summary kernel: use-after-free in nilfs_mdt_destroy
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2978.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2978.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2978
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05715
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19012
published_at 2026-04-24T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.1912
published_at 2026-04-21T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20596
published_at 2026-04-13T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20584
published_at 2026-04-16T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20581
published_at 2026-04-18T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20819
published_at 2026-04-04T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20536
published_at 2026-04-07T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20612
published_at 2026-04-08T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20672
published_at 2026-04-09T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20692
published_at 2026-04-11T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20649
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2978
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120664
reference_id 2120664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120664
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
10
reference_url https://usn.ubuntu.com/5693-1/
reference_id USN-5693-1
reference_type
scores
url https://usn.ubuntu.com/5693-1/
11
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
12
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
13
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
14
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
15
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
16
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
17
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
18
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-2978
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpn4-e2aq-f3d7
63
url VCID-xr58-t3v3-m3ep
vulnerability_id VCID-xr58-t3v3-m3ep
summary kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3303.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3303
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03754
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03677
published_at 2026-04-02T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.0369
published_at 2026-04-04T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03701
published_at 2026-04-07T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03705
published_at 2026-04-08T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03728
published_at 2026-04-09T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03689
published_at 2026-04-11T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03666
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.0364
published_at 2026-04-13T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03617
published_at 2026-04-16T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03629
published_at 2026-04-18T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03751
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3303
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2129859
reference_id 2129859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2129859
21
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
22
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
23
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
24
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
25
reference_url https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com/
reference_id CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/
url https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com/
26
reference_url https://www.debian.org/security/2022/dsa-5257
reference_id dsa-5257
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/
url https://www.debian.org/security/2022/dsa-5257
27
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
reference_id ?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
28
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
reference_id msg00001.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-21T15:31:25Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
29
reference_url https://usn.ubuntu.com/5791-1/
reference_id USN-5791-1
reference_type
scores
url https://usn.ubuntu.com/5791-1/
30
reference_url https://usn.ubuntu.com/5791-2/
reference_id USN-5791-2
reference_type
scores
url https://usn.ubuntu.com/5791-2/
31
reference_url https://usn.ubuntu.com/5791-3/
reference_id USN-5791-3
reference_type
scores
url https://usn.ubuntu.com/5791-3/
32
reference_url https://usn.ubuntu.com/5792-1/
reference_id USN-5792-1
reference_type
scores
url https://usn.ubuntu.com/5792-1/
33
reference_url https://usn.ubuntu.com/5792-2/
reference_id USN-5792-2
reference_type
scores
url https://usn.ubuntu.com/5792-2/
34
reference_url https://usn.ubuntu.com/5793-1/
reference_id USN-5793-1
reference_type
scores
url https://usn.ubuntu.com/5793-1/
35
reference_url https://usn.ubuntu.com/5793-2/
reference_id USN-5793-2
reference_type
scores
url https://usn.ubuntu.com/5793-2/
36
reference_url https://usn.ubuntu.com/5793-3/
reference_id USN-5793-3
reference_type
scores
url https://usn.ubuntu.com/5793-3/
37
reference_url https://usn.ubuntu.com/5793-4/
reference_id USN-5793-4
reference_type
scores
url https://usn.ubuntu.com/5793-4/
38
reference_url https://usn.ubuntu.com/5815-1/
reference_id USN-5815-1
reference_type
scores
url https://usn.ubuntu.com/5815-1/
39
reference_url https://usn.ubuntu.com/5877-1/
reference_id USN-5877-1
reference_type
scores
url https://usn.ubuntu.com/5877-1/
40
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
41
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
42
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
43
reference_url https://usn.ubuntu.com/6071-1/
reference_id USN-6071-1
reference_type
scores
url https://usn.ubuntu.com/6071-1/
44
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-3303
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr58-t3v3-m3ep
64
url VCID-ycce-86bv-qfed
vulnerability_id VCID-ycce-86bv-qfed
summary kernel: large length in the zero DataOffset case in smb2_write() processing could result in out-of-bounds read
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47943.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47943
reference_id
reference_type
scores
0
value 0.01186
scoring_system epss
scoring_elements 0.78762
published_at 2026-04-07T12:55:00Z
1
value 0.01186
scoring_system epss
scoring_elements 0.7878
published_at 2026-04-04T12:55:00Z
2
value 0.01186
scoring_system epss
scoring_elements 0.78787
published_at 2026-04-08T12:55:00Z
3
value 0.01186
scoring_system epss
scoring_elements 0.78795
published_at 2026-04-09T12:55:00Z
4
value 0.01559
scoring_system epss
scoring_elements 0.81468
published_at 2026-04-13T12:55:00Z
5
value 0.01559
scoring_system epss
scoring_elements 0.81411
published_at 2026-04-02T12:55:00Z
6
value 0.01559
scoring_system epss
scoring_elements 0.81475
published_at 2026-04-12T12:55:00Z
7
value 0.01559
scoring_system epss
scoring_elements 0.81487
published_at 2026-04-11T12:55:00Z
8
value 0.01705
scoring_system epss
scoring_elements 0.82349
published_at 2026-04-21T12:55:00Z
9
value 0.01705
scoring_system epss
scoring_elements 0.82346
published_at 2026-04-18T12:55:00Z
10
value 0.01705
scoring_system epss
scoring_elements 0.8237
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47943
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156340
reference_id 2156340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156340
4
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
5
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
6
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
7
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47943
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycce-86bv-qfed
65
url VCID-zs49-wp5q-9be6
vulnerability_id VCID-zs49-wp5q-9be6
summary kernel: use-after-free in io_sqpoll_wait_sq
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47946.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47946
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05457
published_at 2026-04-24T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05329
published_at 2026-04-12T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05319
published_at 2026-04-13T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05267
published_at 2026-04-16T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05268
published_at 2026-04-18T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05417
published_at 2026-04-21T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05257
published_at 2026-04-02T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.0529
published_at 2026-04-04T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05316
published_at 2026-04-07T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.0535
published_at 2026-04-08T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05372
published_at 2026-04-09T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05341
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47946
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155840
reference_id 2155840
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155840
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
fixed_packages
0
url pkg:alpm/archlinux/linux@6.2-1
purl pkg:alpm/archlinux/linux@6.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.2-1
aliases CVE-2022-47946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zs49-wp5q-9be6
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@6.0.12-1