Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@6.12.0-124.43.1?arch=el10_1
Typerpm
Namespaceredhat
Namekernel
Version6.12.0-124.43.1
Qualifiers
arch el10_1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3rrp-h12j-3fcw
vulnerability_id VCID-3rrp-h12j-3fcw
summary kernel: Linux kernel: Information disclosure in efivarfs via incorrect error propagation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23156.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23156
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03329
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0334
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03348
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03353
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03373
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03334
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0326
published_at 2026-04-16T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03269
published_at 2026-04-18T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03388
published_at 2026-04-21T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03305
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03283
published_at 2026-04-13T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04664
published_at 2026-04-26T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.0463
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23156
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2439951
reference_id 2439951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2439951
4
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
5
reference_url https://access.redhat.com/errata/RHSA-2026:9095
reference_id RHSA-2026:9095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9095
fixed_packages
aliases CVE-2026-23156
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3rrp-h12j-3fcw
1
url VCID-5wy8-pbvh-7ue1
vulnerability_id VCID-5wy8-pbvh-7ue1
summary kernel: Linux kernel: Use-after-free in device mapper due to race condition in zone reporting
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38141.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-38141
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05327
published_at 2026-04-26T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05251
published_at 2026-04-21T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05284
published_at 2026-04-24T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05122
published_at 2026-04-04T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05145
published_at 2026-04-07T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05179
published_at 2026-04-08T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05195
published_at 2026-04-09T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05166
published_at 2026-04-11T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.0515
published_at 2026-04-12T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05136
published_at 2026-04-13T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05083
published_at 2026-04-16T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05088
published_at 2026-04-18T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05359
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-38141
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376052
reference_id 2376052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376052
4
reference_url https://access.redhat.com/errata/RHSA-2026:1143
reference_id RHSA-2026:1143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1143
5
reference_url https://access.redhat.com/errata/RHSA-2026:4011
reference_id RHSA-2026:4011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4011
6
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
7
reference_url https://access.redhat.com/errata/RHSA-2026:6193
reference_id RHSA-2026:6193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6193
8
reference_url https://usn.ubuntu.com/7769-1/
reference_id USN-7769-1
reference_type
scores
url https://usn.ubuntu.com/7769-1/
9
reference_url https://usn.ubuntu.com/7769-2/
reference_id USN-7769-2
reference_type
scores
url https://usn.ubuntu.com/7769-2/
10
reference_url https://usn.ubuntu.com/7769-3/
reference_id USN-7769-3
reference_type
scores
url https://usn.ubuntu.com/7769-3/
11
reference_url https://usn.ubuntu.com/7770-1/
reference_id USN-7770-1
reference_type
scores
url https://usn.ubuntu.com/7770-1/
12
reference_url https://usn.ubuntu.com/7771-1/
reference_id USN-7771-1
reference_type
scores
url https://usn.ubuntu.com/7771-1/
13
reference_url https://usn.ubuntu.com/7789-1/
reference_id USN-7789-1
reference_type
scores
url https://usn.ubuntu.com/7789-1/
14
reference_url https://usn.ubuntu.com/7789-2/
reference_id USN-7789-2
reference_type
scores
url https://usn.ubuntu.com/7789-2/
fixed_packages
aliases CVE-2025-38141
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wy8-pbvh-7ue1
2
url VCID-75mg-chqe-k3h8
vulnerability_id VCID-75mg-chqe-k3h8
summary kernel: Linux kernel io_uring: Local privilege escalation, information disclosure, or denial of service via use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38106.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-38106
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05095
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05122
published_at 2026-04-04T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05145
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05179
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05195
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05166
published_at 2026-04-11T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.0515
published_at 2026-04-12T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05136
published_at 2026-04-13T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05083
published_at 2026-04-16T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05088
published_at 2026-04-18T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05251
published_at 2026-04-21T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05284
published_at 2026-04-24T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05327
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-38106
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376077
reference_id 2376077
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2376077
4
reference_url https://access.redhat.com/errata/RHSA-2026:3088
reference_id RHSA-2026:3088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3088
5
reference_url https://access.redhat.com/errata/RHSA-2026:3579
reference_id RHSA-2026:3579
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3579
6
reference_url https://access.redhat.com/errata/RHSA-2026:3966
reference_id RHSA-2026:3966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3966
7
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
8
reference_url https://usn.ubuntu.com/7769-1/
reference_id USN-7769-1
reference_type
scores
url https://usn.ubuntu.com/7769-1/
9
reference_url https://usn.ubuntu.com/7769-2/
reference_id USN-7769-2
reference_type
scores
url https://usn.ubuntu.com/7769-2/
10
reference_url https://usn.ubuntu.com/7769-3/
reference_id USN-7769-3
reference_type
scores
url https://usn.ubuntu.com/7769-3/
11
reference_url https://usn.ubuntu.com/7770-1/
reference_id USN-7770-1
reference_type
scores
url https://usn.ubuntu.com/7770-1/
12
reference_url https://usn.ubuntu.com/7771-1/
reference_id USN-7771-1
reference_type
scores
url https://usn.ubuntu.com/7771-1/
13
reference_url https://usn.ubuntu.com/7789-1/
reference_id USN-7789-1
reference_type
scores
url https://usn.ubuntu.com/7789-1/
14
reference_url https://usn.ubuntu.com/7789-2/
reference_id USN-7789-2
reference_type
scores
url https://usn.ubuntu.com/7789-2/
fixed_packages
aliases CVE-2025-38106
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75mg-chqe-k3h8
3
url VCID-fmsc-fdq9-cbc8
vulnerability_id VCID-fmsc-fdq9-cbc8
summary kernel: Kernel: Use-after-free in GPIO character device allows privilege escalation or denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40249.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40249.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40249
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07747
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07792
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10544
published_at 2026-04-09T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10572
published_at 2026-04-11T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10539
published_at 2026-04-12T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10517
published_at 2026-04-13T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10384
published_at 2026-04-16T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10368
published_at 2026-04-18T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10496
published_at 2026-04-21T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10481
published_at 2026-04-24T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10479
published_at 2026-04-26T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10403
published_at 2026-04-07T12:55:00Z
12
value 0.00035
scoring_system epss
scoring_elements 0.10476
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40249
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418886
reference_id 2418886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418886
4
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
5
reference_url https://usn.ubuntu.com/8094-1/
reference_id USN-8094-1
reference_type
scores
url https://usn.ubuntu.com/8094-1/
6
reference_url https://usn.ubuntu.com/8094-2/
reference_id USN-8094-2
reference_type
scores
url https://usn.ubuntu.com/8094-2/
7
reference_url https://usn.ubuntu.com/8094-3/
reference_id USN-8094-3
reference_type
scores
url https://usn.ubuntu.com/8094-3/
8
reference_url https://usn.ubuntu.com/8094-4/
reference_id USN-8094-4
reference_type
scores
url https://usn.ubuntu.com/8094-4/
9
reference_url https://usn.ubuntu.com/8094-5/
reference_id USN-8094-5
reference_type
scores
url https://usn.ubuntu.com/8094-5/
10
reference_url https://usn.ubuntu.com/8152-1/
reference_id USN-8152-1
reference_type
scores
url https://usn.ubuntu.com/8152-1/
fixed_packages
aliases CVE-2025-40249
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fmsc-fdq9-cbc8
4
url VCID-kp8m-f9zt-6qb3
vulnerability_id VCID-kp8m-f9zt-6qb3
summary kernel: drm/xe: Make dma-fences compliant with the safe access rules
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38703.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-38703
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04478
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04503
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04516
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04552
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04567
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04557
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04541
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04525
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04501
published_at 2026-04-16T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0451
published_at 2026-04-18T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04645
published_at 2026-04-21T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04687
published_at 2026-04-24T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04722
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-38703
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2393157
reference_id 2393157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2393157
4
reference_url https://access.redhat.com/errata/RHSA-2026:0793
reference_id RHSA-2026:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0793
5
reference_url https://access.redhat.com/errata/RHSA-2026:4011
reference_id RHSA-2026:4011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4011
6
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
7
reference_url https://access.redhat.com/errata/RHSA-2026:4111
reference_id RHSA-2026:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4111
8
reference_url https://usn.ubuntu.com/8028-1/
reference_id USN-8028-1
reference_type
scores
url https://usn.ubuntu.com/8028-1/
9
reference_url https://usn.ubuntu.com/8028-2/
reference_id USN-8028-2
reference_type
scores
url https://usn.ubuntu.com/8028-2/
10
reference_url https://usn.ubuntu.com/8028-3/
reference_id USN-8028-3
reference_type
scores
url https://usn.ubuntu.com/8028-3/
11
reference_url https://usn.ubuntu.com/8028-4/
reference_id USN-8028-4
reference_type
scores
url https://usn.ubuntu.com/8028-4/
12
reference_url https://usn.ubuntu.com/8028-5/
reference_id USN-8028-5
reference_type
scores
url https://usn.ubuntu.com/8028-5/
13
reference_url https://usn.ubuntu.com/8028-6/
reference_id USN-8028-6
reference_type
scores
url https://usn.ubuntu.com/8028-6/
14
reference_url https://usn.ubuntu.com/8028-7/
reference_id USN-8028-7
reference_type
scores
url https://usn.ubuntu.com/8028-7/
15
reference_url https://usn.ubuntu.com/8028-8/
reference_id USN-8028-8
reference_type
scores
url https://usn.ubuntu.com/8028-8/
16
reference_url https://usn.ubuntu.com/8031-1/
reference_id USN-8031-1
reference_type
scores
url https://usn.ubuntu.com/8031-1/
17
reference_url https://usn.ubuntu.com/8031-2/
reference_id USN-8031-2
reference_type
scores
url https://usn.ubuntu.com/8031-2/
18
reference_url https://usn.ubuntu.com/8031-3/
reference_id USN-8031-3
reference_type
scores
url https://usn.ubuntu.com/8031-3/
19
reference_url https://usn.ubuntu.com/8052-1/
reference_id USN-8052-1
reference_type
scores
url https://usn.ubuntu.com/8052-1/
20
reference_url https://usn.ubuntu.com/8052-2/
reference_id USN-8052-2
reference_type
scores
url https://usn.ubuntu.com/8052-2/
21
reference_url https://usn.ubuntu.com/8074-1/
reference_id USN-8074-1
reference_type
scores
url https://usn.ubuntu.com/8074-1/
22
reference_url https://usn.ubuntu.com/8074-2/
reference_id USN-8074-2
reference_type
scores
url https://usn.ubuntu.com/8074-2/
23
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
fixed_packages
aliases CVE-2025-38703
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kp8m-f9zt-6qb3
5
url VCID-m2f1-4sgc-tuhv
vulnerability_id VCID-m2f1-4sgc-tuhv
summary kernel: macvlan: fix possible UAF in macvlan_forward_source()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23001.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23001
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.0133
published_at 2026-04-26T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01319
published_at 2026-04-21T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01325
published_at 2026-04-24T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01244
published_at 2026-04-04T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01252
published_at 2026-04-07T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01258
published_at 2026-04-08T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01262
published_at 2026-04-09T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01243
published_at 2026-04-11T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01237
published_at 2026-04-12T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.0124
published_at 2026-04-13T12:55:00Z
10
value 0.00011
scoring_system epss
scoring_elements 0.01233
published_at 2026-04-16T12:55:00Z
11
value 0.00011
scoring_system epss
scoring_elements 0.01246
published_at 2026-04-18T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00937
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23001
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2432664
reference_id 2432664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2432664
5
reference_url https://access.redhat.com/errata/RHSA-2026:3963
reference_id RHSA-2026:3963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3963
6
reference_url https://access.redhat.com/errata/RHSA-2026:3964
reference_id RHSA-2026:3964
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3964
7
reference_url https://access.redhat.com/errata/RHSA-2026:3966
reference_id RHSA-2026:3966
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3966
8
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
9
reference_url https://access.redhat.com/errata/RHSA-2026:5197
reference_id RHSA-2026:5197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5197
10
reference_url https://access.redhat.com/errata/RHSA-2026:6310
reference_id RHSA-2026:6310
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6310
11
reference_url https://access.redhat.com/errata/RHSA-2026:6948
reference_id RHSA-2026:6948
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6948
12
reference_url https://access.redhat.com/errata/RHSA-2026:6954
reference_id RHSA-2026:6954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6954
13
reference_url https://access.redhat.com/errata/RHSA-2026:6986
reference_id RHSA-2026:6986
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6986
14
reference_url https://access.redhat.com/errata/RHSA-2026:9835
reference_id RHSA-2026:9835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9835
15
reference_url https://access.redhat.com/errata/RHSA-2026:9836
reference_id RHSA-2026:9836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9836
16
reference_url https://usn.ubuntu.com/8162-1/
reference_id USN-8162-1
reference_type
scores
url https://usn.ubuntu.com/8162-1/
17
reference_url https://usn.ubuntu.com/8180-1/
reference_id USN-8180-1
reference_type
scores
url https://usn.ubuntu.com/8180-1/
18
reference_url https://usn.ubuntu.com/8180-2/
reference_id USN-8180-2
reference_type
scores
url https://usn.ubuntu.com/8180-2/
19
reference_url https://usn.ubuntu.com/8180-3/
reference_id USN-8180-3
reference_type
scores
url https://usn.ubuntu.com/8180-3/
20
reference_url https://usn.ubuntu.com/8180-4/
reference_id USN-8180-4
reference_type
scores
url https://usn.ubuntu.com/8180-4/
21
reference_url https://usn.ubuntu.com/8180-5/
reference_id USN-8180-5
reference_type
scores
url https://usn.ubuntu.com/8180-5/
22
reference_url https://usn.ubuntu.com/8186-1/
reference_id USN-8186-1
reference_type
scores
url https://usn.ubuntu.com/8186-1/
23
reference_url https://usn.ubuntu.com/8187-1/
reference_id USN-8187-1
reference_type
scores
url https://usn.ubuntu.com/8187-1/
24
reference_url https://usn.ubuntu.com/8188-1/
reference_id USN-8188-1
reference_type
scores
url https://usn.ubuntu.com/8188-1/
fixed_packages
aliases CVE-2026-23001
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2f1-4sgc-tuhv
6
url VCID-m2h3-5qgn-2ugr
vulnerability_id VCID-m2h3-5qgn-2ugr
summary kernel: HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39818.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-39818
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01614
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01629
published_at 2026-04-09T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0162
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01622
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01615
published_at 2026-04-11T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02249
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02353
published_at 2026-04-21T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.0233
published_at 2026-04-24T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.0226
published_at 2026-04-18T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02324
published_at 2026-04-26T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.0227
published_at 2026-04-12T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02267
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-39818
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395797
reference_id 2395797
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395797
4
reference_url https://git.kernel.org/stable/c/78d4cf0466c79452e47aa6f720afbde63e709ccc
reference_id 78d4cf0466c79452e47aa6f720afbde63e709ccc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:16:14Z/
url https://git.kernel.org/stable/c/78d4cf0466c79452e47aa6f720afbde63e709ccc
5
reference_url https://git.kernel.org/stable/c/a7fc15ed629be89e51e09b743277c53e0a0168f5
reference_id a7fc15ed629be89e51e09b743277c53e0a0168f5
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:16:14Z/
url https://git.kernel.org/stable/c/a7fc15ed629be89e51e09b743277c53e0a0168f5
6
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
7
reference_url https://access.redhat.com/errata/RHSA-2026:4759
reference_id RHSA-2026:4759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4759
8
reference_url https://usn.ubuntu.com/7879-1/
reference_id USN-7879-1
reference_type
scores
url https://usn.ubuntu.com/7879-1/
9
reference_url https://usn.ubuntu.com/7879-2/
reference_id USN-7879-2
reference_type
scores
url https://usn.ubuntu.com/7879-2/
10
reference_url https://usn.ubuntu.com/7879-3/
reference_id USN-7879-3
reference_type
scores
url https://usn.ubuntu.com/7879-3/
11
reference_url https://usn.ubuntu.com/7879-4/
reference_id USN-7879-4
reference_type
scores
url https://usn.ubuntu.com/7879-4/
12
reference_url https://usn.ubuntu.com/7934-1/
reference_id USN-7934-1
reference_type
scores
url https://usn.ubuntu.com/7934-1/
fixed_packages
aliases CVE-2025-39818
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m2h3-5qgn-2ugr
7
url VCID-pvfh-earf-aqdj
vulnerability_id VCID-pvfh-earf-aqdj
summary kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-39760
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04201
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04222
published_at 2026-04-04T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05379
published_at 2026-04-09T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05348
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05336
published_at 2026-04-12T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05325
published_at 2026-04-13T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05273
published_at 2026-04-16T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-18T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05424
published_at 2026-04-21T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05464
published_at 2026-04-24T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05506
published_at 2026-04-26T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05323
published_at 2026-04-07T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05356
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-39760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2394601
reference_id 2394601
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2394601
5
reference_url https://access.redhat.com/errata/RHSA-2026:1661
reference_id RHSA-2026:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1661
6
reference_url https://access.redhat.com/errata/RHSA-2026:1662
reference_id RHSA-2026:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1662
7
reference_url https://access.redhat.com/errata/RHSA-2026:2212
reference_id RHSA-2026:2212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2212
8
reference_url https://access.redhat.com/errata/RHSA-2026:2759
reference_id RHSA-2026:2759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2759
9
reference_url https://access.redhat.com/errata/RHSA-2026:2766
reference_id RHSA-2026:2766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2766
10
reference_url https://access.redhat.com/errata/RHSA-2026:3124
reference_id RHSA-2026:3124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3124
11
reference_url https://access.redhat.com/errata/RHSA-2026:3267
reference_id RHSA-2026:3267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3267
12
reference_url https://access.redhat.com/errata/RHSA-2026:3268
reference_id RHSA-2026:3268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3268
13
reference_url https://access.redhat.com/errata/RHSA-2026:3277
reference_id RHSA-2026:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3277
14
reference_url https://access.redhat.com/errata/RHSA-2026:3293
reference_id RHSA-2026:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3293
15
reference_url https://access.redhat.com/errata/RHSA-2026:3358
reference_id RHSA-2026:3358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3358
16
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
17
reference_url https://access.redhat.com/errata/RHSA-2026:3375
reference_id RHSA-2026:3375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3375
18
reference_url https://access.redhat.com/errata/RHSA-2026:3388
reference_id RHSA-2026:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3388
19
reference_url https://access.redhat.com/errata/RHSA-2026:3634
reference_id RHSA-2026:3634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3634
20
reference_url https://access.redhat.com/errata/RHSA-2026:3685
reference_id RHSA-2026:3685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3685
21
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
22
reference_url https://usn.ubuntu.com/7909-1/
reference_id USN-7909-1
reference_type
scores
url https://usn.ubuntu.com/7909-1/
23
reference_url https://usn.ubuntu.com/7909-2/
reference_id USN-7909-2
reference_type
scores
url https://usn.ubuntu.com/7909-2/
24
reference_url https://usn.ubuntu.com/7909-3/
reference_id USN-7909-3
reference_type
scores
url https://usn.ubuntu.com/7909-3/
25
reference_url https://usn.ubuntu.com/7909-4/
reference_id USN-7909-4
reference_type
scores
url https://usn.ubuntu.com/7909-4/
26
reference_url https://usn.ubuntu.com/7909-5/
reference_id USN-7909-5
reference_type
scores
url https://usn.ubuntu.com/7909-5/
27
reference_url https://usn.ubuntu.com/7910-1/
reference_id USN-7910-1
reference_type
scores
url https://usn.ubuntu.com/7910-1/
28
reference_url https://usn.ubuntu.com/7910-2/
reference_id USN-7910-2
reference_type
scores
url https://usn.ubuntu.com/7910-2/
29
reference_url https://usn.ubuntu.com/7933-1/
reference_id USN-7933-1
reference_type
scores
url https://usn.ubuntu.com/7933-1/
30
reference_url https://usn.ubuntu.com/7938-1/
reference_id USN-7938-1
reference_type
scores
url https://usn.ubuntu.com/7938-1/
31
reference_url https://usn.ubuntu.com/8028-1/
reference_id USN-8028-1
reference_type
scores
url https://usn.ubuntu.com/8028-1/
32
reference_url https://usn.ubuntu.com/8028-2/
reference_id USN-8028-2
reference_type
scores
url https://usn.ubuntu.com/8028-2/
33
reference_url https://usn.ubuntu.com/8028-3/
reference_id USN-8028-3
reference_type
scores
url https://usn.ubuntu.com/8028-3/
34
reference_url https://usn.ubuntu.com/8028-4/
reference_id USN-8028-4
reference_type
scores
url https://usn.ubuntu.com/8028-4/
35
reference_url https://usn.ubuntu.com/8028-5/
reference_id USN-8028-5
reference_type
scores
url https://usn.ubuntu.com/8028-5/
36
reference_url https://usn.ubuntu.com/8028-6/
reference_id USN-8028-6
reference_type
scores
url https://usn.ubuntu.com/8028-6/
37
reference_url https://usn.ubuntu.com/8028-7/
reference_id USN-8028-7
reference_type
scores
url https://usn.ubuntu.com/8028-7/
38
reference_url https://usn.ubuntu.com/8028-8/
reference_id USN-8028-8
reference_type
scores
url https://usn.ubuntu.com/8028-8/
39
reference_url https://usn.ubuntu.com/8031-1/
reference_id USN-8031-1
reference_type
scores
url https://usn.ubuntu.com/8031-1/
40
reference_url https://usn.ubuntu.com/8031-2/
reference_id USN-8031-2
reference_type
scores
url https://usn.ubuntu.com/8031-2/
41
reference_url https://usn.ubuntu.com/8031-3/
reference_id USN-8031-3
reference_type
scores
url https://usn.ubuntu.com/8031-3/
42
reference_url https://usn.ubuntu.com/8052-1/
reference_id USN-8052-1
reference_type
scores
url https://usn.ubuntu.com/8052-1/
43
reference_url https://usn.ubuntu.com/8052-2/
reference_id USN-8052-2
reference_type
scores
url https://usn.ubuntu.com/8052-2/
44
reference_url https://usn.ubuntu.com/8074-1/
reference_id USN-8074-1
reference_type
scores
url https://usn.ubuntu.com/8074-1/
45
reference_url https://usn.ubuntu.com/8074-2/
reference_id USN-8074-2
reference_type
scores
url https://usn.ubuntu.com/8074-2/
46
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
fixed_packages
aliases CVE-2025-39760
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvfh-earf-aqdj
8
url VCID-uaka-4bcz-77du
vulnerability_id VCID-uaka-4bcz-77du
summary kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-71085.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-71085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-71085
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06966
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0702
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.07
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07055
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.07085
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07092
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07081
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.07071
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.07011
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06995
published_at 2026-04-18T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.07128
published_at 2026-04-21T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.07097
published_at 2026-04-24T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-71085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429026
reference_id 2429026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2429026
5
reference_url https://access.redhat.com/errata/RHSA-2026:3488
reference_id RHSA-2026:3488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3488
6
reference_url https://access.redhat.com/errata/RHSA-2026:3963
reference_id RHSA-2026:3963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3963
7
reference_url https://access.redhat.com/errata/RHSA-2026:3964
reference_id RHSA-2026:3964
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3964
8
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
9
reference_url https://access.redhat.com/errata/RHSA-2026:4246
reference_id RHSA-2026:4246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4246
10
reference_url https://access.redhat.com/errata/RHSA-2026:4745
reference_id RHSA-2026:4745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4745
11
reference_url https://access.redhat.com/errata/RHSA-2026:5689
reference_id RHSA-2026:5689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5689
12
reference_url https://access.redhat.com/errata/RHSA-2026:5690
reference_id RHSA-2026:5690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5690
13
reference_url https://access.redhat.com/errata/RHSA-2026:5691
reference_id RHSA-2026:5691
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5691
14
reference_url https://access.redhat.com/errata/RHSA-2026:5693
reference_id RHSA-2026:5693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5693
15
reference_url https://access.redhat.com/errata/RHSA-2026:5727
reference_id RHSA-2026:5727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5727
16
reference_url https://access.redhat.com/errata/RHSA-2026:5732
reference_id RHSA-2026:5732
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5732
17
reference_url https://access.redhat.com/errata/RHSA-2026:5813
reference_id RHSA-2026:5813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5813
18
reference_url https://access.redhat.com/errata/RHSA-2026:6193
reference_id RHSA-2026:6193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6193
19
reference_url https://access.redhat.com/errata/RHSA-2026:7003
reference_id RHSA-2026:7003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7003
20
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
21
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
22
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
23
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
24
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
25
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
26
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
27
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
28
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
29
reference_url https://usn.ubuntu.com/8177-1/
reference_id USN-8177-1
reference_type
scores
url https://usn.ubuntu.com/8177-1/
30
reference_url https://usn.ubuntu.com/8177-2/
reference_id USN-8177-2
reference_type
scores
url https://usn.ubuntu.com/8177-2/
31
reference_url https://usn.ubuntu.com/8179-1/
reference_id USN-8179-1
reference_type
scores
url https://usn.ubuntu.com/8179-1/
32
reference_url https://usn.ubuntu.com/8179-2/
reference_id USN-8179-2
reference_type
scores
url https://usn.ubuntu.com/8179-2/
33
reference_url https://usn.ubuntu.com/8179-3/
reference_id USN-8179-3
reference_type
scores
url https://usn.ubuntu.com/8179-3/
34
reference_url https://usn.ubuntu.com/8183-1/
reference_id USN-8183-1
reference_type
scores
url https://usn.ubuntu.com/8183-1/
35
reference_url https://usn.ubuntu.com/8183-2/
reference_id USN-8183-2
reference_type
scores
url https://usn.ubuntu.com/8183-2/
36
reference_url https://usn.ubuntu.com/8184-1/
reference_id USN-8184-1
reference_type
scores
url https://usn.ubuntu.com/8184-1/
37
reference_url https://usn.ubuntu.com/8185-1/
reference_id USN-8185-1
reference_type
scores
url https://usn.ubuntu.com/8185-1/
38
reference_url https://usn.ubuntu.com/8203-1/
reference_id USN-8203-1
reference_type
scores
url https://usn.ubuntu.com/8203-1/
39
reference_url https://usn.ubuntu.com/8204-1/
reference_id USN-8204-1
reference_type
scores
url https://usn.ubuntu.com/8204-1/
fixed_packages
aliases CVE-2025-71085
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uaka-4bcz-77du
9
url VCID-xkg2-9n6y-5kan
vulnerability_id VCID-xkg2-9n6y-5kan
summary kernel: Linux kernel: Denial of Service due to a deadlock in hugetlb folio migration
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23097.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-23097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23097
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03203
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03212
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03215
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0322
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03244
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03171
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0452
published_at 2026-04-26T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04364
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04332
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.0434
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04472
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23097
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436802
reference_id 2436802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436802
5
reference_url https://access.redhat.com/errata/RHSA-2026:10108
reference_id RHSA-2026:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10108
6
reference_url https://access.redhat.com/errata/RHSA-2026:3463
reference_id RHSA-2026:3463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3463
7
reference_url https://access.redhat.com/errata/RHSA-2026:3464
reference_id RHSA-2026:3464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3464
8
reference_url https://access.redhat.com/errata/RHSA-2026:3488
reference_id RHSA-2026:3488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3488
9
reference_url https://access.redhat.com/errata/RHSA-2026:4012
reference_id RHSA-2026:4012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4012
10
reference_url https://usn.ubuntu.com/8162-1/
reference_id USN-8162-1
reference_type
scores
url https://usn.ubuntu.com/8162-1/
11
reference_url https://usn.ubuntu.com/8180-1/
reference_id USN-8180-1
reference_type
scores
url https://usn.ubuntu.com/8180-1/
12
reference_url https://usn.ubuntu.com/8180-2/
reference_id USN-8180-2
reference_type
scores
url https://usn.ubuntu.com/8180-2/
13
reference_url https://usn.ubuntu.com/8180-3/
reference_id USN-8180-3
reference_type
scores
url https://usn.ubuntu.com/8180-3/
14
reference_url https://usn.ubuntu.com/8180-4/
reference_id USN-8180-4
reference_type
scores
url https://usn.ubuntu.com/8180-4/
15
reference_url https://usn.ubuntu.com/8180-5/
reference_id USN-8180-5
reference_type
scores
url https://usn.ubuntu.com/8180-5/
16
reference_url https://usn.ubuntu.com/8186-1/
reference_id USN-8186-1
reference_type
scores
url https://usn.ubuntu.com/8186-1/
17
reference_url https://usn.ubuntu.com/8187-1/
reference_id USN-8187-1
reference_type
scores
url https://usn.ubuntu.com/8187-1/
18
reference_url https://usn.ubuntu.com/8188-1/
reference_id USN-8188-1
reference_type
scores
url https://usn.ubuntu.com/8188-1/
fixed_packages
aliases CVE-2026-23097
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xkg2-9n6y-5kan
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@6.12.0-124.43.1%3Farch=el10_1