Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.165.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.165.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-6wu1-5wuf-nyan
vulnerability_id VCID-6wu1-5wuf-nyan
summary kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40322.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40322
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10564
published_at 2026-04-07T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10636
published_at 2026-04-08T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10643
published_at 2026-04-02T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10705
published_at 2026-04-04T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13451
published_at 2026-04-16T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13446
published_at 2026-04-18T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.1352
published_at 2026-04-21T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13528
published_at 2026-04-24T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13501
published_at 2026-04-26T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.1365
published_at 2026-04-09T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13621
published_at 2026-04-11T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13585
published_at 2026-04-12T12:55:00Z
12
value 0.00044
scoring_system epss
scoring_elements 0.13537
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40322
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419902
reference_id 2419902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419902
5
reference_url https://access.redhat.com/errata/RHSA-2026:1661
reference_id RHSA-2026:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1661
6
reference_url https://access.redhat.com/errata/RHSA-2026:1662
reference_id RHSA-2026:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1662
7
reference_url https://access.redhat.com/errata/RHSA-2026:1727
reference_id RHSA-2026:1727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1727
8
reference_url https://access.redhat.com/errata/RHSA-2026:2282
reference_id RHSA-2026:2282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2282
9
reference_url https://access.redhat.com/errata/RHSA-2026:2352
reference_id RHSA-2026:2352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2352
10
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
11
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
12
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
13
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
14
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
15
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
16
reference_url https://access.redhat.com/errata/RHSA-2026:2594
reference_id RHSA-2026:2594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2594
17
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
18
reference_url https://access.redhat.com/errata/RHSA-2026:2722
reference_id RHSA-2026:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2722
19
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
20
reference_url https://usn.ubuntu.com/8029-1/
reference_id USN-8029-1
reference_type
scores
url https://usn.ubuntu.com/8029-1/
21
reference_url https://usn.ubuntu.com/8029-2/
reference_id USN-8029-2
reference_type
scores
url https://usn.ubuntu.com/8029-2/
22
reference_url https://usn.ubuntu.com/8029-3/
reference_id USN-8029-3
reference_type
scores
url https://usn.ubuntu.com/8029-3/
23
reference_url https://usn.ubuntu.com/8030-1/
reference_id USN-8030-1
reference_type
scores
url https://usn.ubuntu.com/8030-1/
24
reference_url https://usn.ubuntu.com/8048-1/
reference_id USN-8048-1
reference_type
scores
url https://usn.ubuntu.com/8048-1/
25
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
26
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
27
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
28
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
29
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
30
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
31
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
32
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
33
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
34
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
35
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
36
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
37
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
38
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
39
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
40
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
41
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
42
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-40322
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wu1-5wuf-nyan
1
url VCID-7qtt-szq5-huep
vulnerability_id VCID-7qtt-szq5-huep
summary kernel: ext4: fix use-after-free in ext4_orphan_cleanup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50673.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50673
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10911
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10975
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.108
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10876
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10929
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14454
published_at 2026-04-21T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14487
published_at 2026-04-24T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14484
published_at 2026-04-26T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14588
published_at 2026-04-11T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14549
published_at 2026-04-12T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14491
published_at 2026-04-13T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14383
published_at 2026-04-16T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14384
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420347
reference_id 2420347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420347
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2026:2264
reference_id RHSA-2026:2264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2264
7
reference_url https://access.redhat.com/errata/RHSA-2026:2378
reference_id RHSA-2026:2378
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2378
8
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
9
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
10
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
11
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
12
reference_url https://access.redhat.com/errata/RHSA-2026:3267
reference_id RHSA-2026:3267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3267
13
reference_url https://access.redhat.com/errata/RHSA-2026:3277
reference_id RHSA-2026:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3277
14
reference_url https://access.redhat.com/errata/RHSA-2026:3358
reference_id RHSA-2026:3358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3358
15
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
16
reference_url https://access.redhat.com/errata/RHSA-2026:3634
reference_id RHSA-2026:3634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3634
17
reference_url https://access.redhat.com/errata/RHSA-2026:3685
reference_id RHSA-2026:3685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3685
fixed_packages
aliases CVE-2022-50673
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qtt-szq5-huep
2
url VCID-dcwa-n32k-73cm
vulnerability_id VCID-dcwa-n32k-73cm
summary kernel: Bluetooth: hci_event: call disconnect callback before deleting conn
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53673.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53673
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00517
published_at 2026-04-02T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.0051
published_at 2026-04-04T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00507
published_at 2026-04-07T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00505
published_at 2026-04-08T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00503
published_at 2026-04-13T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00504
published_at 2026-04-18T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00501
published_at 2026-04-12T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.005
published_at 2026-04-16T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00535
published_at 2026-04-21T12:55:00Z
9
value 7e-05
scoring_system epss
scoring_elements 0.00531
published_at 2026-04-24T12:55:00Z
10
value 7e-05
scoring_system epss
scoring_elements 0.00533
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53673
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402193
reference_id 2402193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402193
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2026:1142
reference_id RHSA-2026:1142
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1142
7
reference_url https://access.redhat.com/errata/RHSA-2026:1148
reference_id RHSA-2026:1148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1148
8
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
9
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
10
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
11
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
12
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
13
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
14
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
fixed_packages
aliases CVE-2023-53673
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcwa-n32k-73cm
3
url VCID-gg4r-7tb8-rkha
vulnerability_id VCID-gg4r-7tb8-rkha
summary kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40304.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40304
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16546
published_at 2026-04-07T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16631
published_at 2026-04-08T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16694
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16755
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21015
published_at 2026-04-16T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21026
published_at 2026-04-18T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21004
published_at 2026-04-21T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20877
published_at 2026-04-24T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20879
published_at 2026-04-26T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21111
published_at 2026-04-09T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21121
published_at 2026-04-11T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21077
published_at 2026-04-12T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21025
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40304
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419870
reference_id 2419870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419870
5
reference_url https://access.redhat.com/errata/RHSA-2026:1727
reference_id RHSA-2026:1727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1727
6
reference_url https://access.redhat.com/errata/RHSA-2026:2282
reference_id RHSA-2026:2282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2282
7
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
8
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
9
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
10
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
11
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
12
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
13
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
14
reference_url https://access.redhat.com/errata/RHSA-2026:2720
reference_id RHSA-2026:2720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2720
15
reference_url https://access.redhat.com/errata/RHSA-2026:2722
reference_id RHSA-2026:2722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2722
16
reference_url https://access.redhat.com/errata/RHSA-2026:2759
reference_id RHSA-2026:2759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2759
17
reference_url https://access.redhat.com/errata/RHSA-2026:2766
reference_id RHSA-2026:2766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2766
18
reference_url https://access.redhat.com/errata/RHSA-2026:2821
reference_id RHSA-2026:2821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2821
19
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
20
reference_url https://usn.ubuntu.com/8029-1/
reference_id USN-8029-1
reference_type
scores
url https://usn.ubuntu.com/8029-1/
21
reference_url https://usn.ubuntu.com/8029-2/
reference_id USN-8029-2
reference_type
scores
url https://usn.ubuntu.com/8029-2/
22
reference_url https://usn.ubuntu.com/8029-3/
reference_id USN-8029-3
reference_type
scores
url https://usn.ubuntu.com/8029-3/
23
reference_url https://usn.ubuntu.com/8030-1/
reference_id USN-8030-1
reference_type
scores
url https://usn.ubuntu.com/8030-1/
24
reference_url https://usn.ubuntu.com/8048-1/
reference_id USN-8048-1
reference_type
scores
url https://usn.ubuntu.com/8048-1/
25
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
26
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
27
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
28
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
29
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
30
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
31
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
32
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
33
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
34
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
35
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
36
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
37
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
38
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
39
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
40
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
41
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
42
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-40304
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gg4r-7tb8-rkha
4
url VCID-h6rc-a42b-4yhq
vulnerability_id VCID-h6rc-a42b-4yhq
summary kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53833.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53833
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06793
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0684
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06822
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06874
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-09T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09299
published_at 2026-04-21T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09349
published_at 2026-04-24T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09303
published_at 2026-04-26T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09273
published_at 2026-04-12T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09259
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-16T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09144
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53833
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2420366
reference_id 2420366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2420366
4
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
5
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
6
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
7
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
8
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
9
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
10
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
11
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
12
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
fixed_packages
aliases CVE-2023-53833
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rc-a42b-4yhq
5
url VCID-jzay-3g96-1kfr
vulnerability_id VCID-jzay-3g96-1kfr
summary kernel: Linux kernel: ath9k_htc out-of-bounds access vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49503.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49503
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10025
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10083
published_at 2026-04-04T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17923
published_at 2026-04-09T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-11T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17895
published_at 2026-04-12T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17846
published_at 2026-04-13T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17788
published_at 2026-04-16T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17798
published_at 2026-04-18T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17835
published_at 2026-04-21T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17742
published_at 2026-04-24T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.1772
published_at 2026-04-26T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17775
published_at 2026-04-07T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17863
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347814
reference_id 2347814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347814
5
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
6
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
fixed_packages
aliases CVE-2022-49503
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzay-3g96-1kfr
6
url VCID-my1h-j8j2-z3fz
vulnerability_id VCID-my1h-j8j2-z3fz
summary kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40251.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40251.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40251
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06957
published_at 2026-04-04T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09469
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09483
published_at 2026-04-11T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09456
published_at 2026-04-12T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09438
published_at 2026-04-13T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09331
published_at 2026-04-16T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09332
published_at 2026-04-18T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.0948
published_at 2026-04-21T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09532
published_at 2026-04-24T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09496
published_at 2026-04-26T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09347
published_at 2026-04-07T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09421
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40251
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418892
reference_id 2418892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418892
5
reference_url https://access.redhat.com/errata/RHSA-2026:1194
reference_id RHSA-2026:1194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1194
6
reference_url https://access.redhat.com/errata/RHSA-2026:1617
reference_id RHSA-2026:1617
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1617
7
reference_url https://access.redhat.com/errata/RHSA-2026:1690
reference_id RHSA-2026:1690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1690
8
reference_url https://access.redhat.com/errata/RHSA-2026:1727
reference_id RHSA-2026:1727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1727
9
reference_url https://access.redhat.com/errata/RHSA-2026:1879
reference_id RHSA-2026:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1879
10
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
11
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
12
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
13
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
14
reference_url https://usn.ubuntu.com/8094-1/
reference_id USN-8094-1
reference_type
scores
url https://usn.ubuntu.com/8094-1/
15
reference_url https://usn.ubuntu.com/8094-2/
reference_id USN-8094-2
reference_type
scores
url https://usn.ubuntu.com/8094-2/
16
reference_url https://usn.ubuntu.com/8094-3/
reference_id USN-8094-3
reference_type
scores
url https://usn.ubuntu.com/8094-3/
17
reference_url https://usn.ubuntu.com/8094-4/
reference_id USN-8094-4
reference_type
scores
url https://usn.ubuntu.com/8094-4/
18
reference_url https://usn.ubuntu.com/8094-5/
reference_id USN-8094-5
reference_type
scores
url https://usn.ubuntu.com/8094-5/
19
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
20
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
21
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
22
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
23
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
24
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
25
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
26
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
27
reference_url https://usn.ubuntu.com/8152-1/
reference_id USN-8152-1
reference_type
scores
url https://usn.ubuntu.com/8152-1/
28
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-40251
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my1h-j8j2-z3fz
7
url VCID-qfge-zawt-qyb3
vulnerability_id VCID-qfge-zawt-qyb3
summary kernel: net: atlantic: fix fragment overflow handling in RX path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-68301
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16694
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16755
published_at 2026-04-04T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16546
published_at 2026-04-07T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16631
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16684
published_at 2026-04-09T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16662
published_at 2026-04-11T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16621
published_at 2026-04-12T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16561
published_at 2026-04-13T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16499
published_at 2026-04-16T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20879
published_at 2026-04-26T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21026
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21004
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20877
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-68301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2422836
reference_id 2422836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2422836
5
reference_url https://access.redhat.com/errata/RHSA-2026:0759
reference_id RHSA-2026:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0759
6
reference_url https://access.redhat.com/errata/RHSA-2026:0760
reference_id RHSA-2026:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0760
7
reference_url https://access.redhat.com/errata/RHSA-2026:1143
reference_id RHSA-2026:1143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1143
8
reference_url https://access.redhat.com/errata/RHSA-2026:1690
reference_id RHSA-2026:1690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1690
9
reference_url https://access.redhat.com/errata/RHSA-2026:1703
reference_id RHSA-2026:1703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1703
10
reference_url https://access.redhat.com/errata/RHSA-2026:1727
reference_id RHSA-2026:1727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1727
11
reference_url https://access.redhat.com/errata/RHSA-2026:1879
reference_id RHSA-2026:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1879
12
reference_url https://access.redhat.com/errata/RHSA-2026:1886
reference_id RHSA-2026:1886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1886
13
reference_url https://access.redhat.com/errata/RHSA-2026:1909
reference_id RHSA-2026:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1909
14
reference_url https://access.redhat.com/errata/RHSA-2026:1946
reference_id RHSA-2026:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1946
15
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
16
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
17
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
18
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
19
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
20
reference_url https://usn.ubuntu.com/8094-1/
reference_id USN-8094-1
reference_type
scores
url https://usn.ubuntu.com/8094-1/
21
reference_url https://usn.ubuntu.com/8094-2/
reference_id USN-8094-2
reference_type
scores
url https://usn.ubuntu.com/8094-2/
22
reference_url https://usn.ubuntu.com/8094-3/
reference_id USN-8094-3
reference_type
scores
url https://usn.ubuntu.com/8094-3/
23
reference_url https://usn.ubuntu.com/8094-4/
reference_id USN-8094-4
reference_type
scores
url https://usn.ubuntu.com/8094-4/
24
reference_url https://usn.ubuntu.com/8094-5/
reference_id USN-8094-5
reference_type
scores
url https://usn.ubuntu.com/8094-5/
25
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
26
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
27
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
28
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
29
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
30
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
31
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
32
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
33
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
34
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
35
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
36
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
37
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
38
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
39
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
40
reference_url https://usn.ubuntu.com/8152-1/
reference_id USN-8152-1
reference_type
scores
url https://usn.ubuntu.com/8152-1/
41
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
42
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
43
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-68301
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfge-zawt-qyb3
8
url VCID-qtm2-45az-qygz
vulnerability_id VCID-qtm2-45az-qygz
summary kernel: Linux kernel: Out-of-bounds write in VXLAN due to incorrect nexthop hash size leading to denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53192.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53192
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03059
published_at 2026-04-07T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03062
published_at 2026-04-08T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03087
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03045
published_at 2026-04-02T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.0413
published_at 2026-04-18T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04252
published_at 2026-04-21T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04264
published_at 2026-04-24T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04283
published_at 2026-04-26T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04195
published_at 2026-04-11T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04178
published_at 2026-04-12T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04153
published_at 2026-04-13T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04123
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395232
reference_id 2395232
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395232
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
7
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
8
reference_url https://access.redhat.com/errata/RHSA-2026:3267
reference_id RHSA-2026:3267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3267
9
reference_url https://access.redhat.com/errata/RHSA-2026:3358
reference_id RHSA-2026:3358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3358
fixed_packages
aliases CVE-2023-53192
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtm2-45az-qygz
9
url VCID-vwpb-78dc-wuf7
vulnerability_id VCID-vwpb-78dc-wuf7
summary kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50865
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07494
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07533
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07514
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07593
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.0759
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07564
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07488
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07476
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07608
published_at 2026-04-21T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-24T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50865
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426226
reference_id 2426226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426226
5
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
6
reference_url https://access.redhat.com/errata/RHSA-2026:1661
reference_id RHSA-2026:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1661
7
reference_url https://access.redhat.com/errata/RHSA-2026:1662
reference_id RHSA-2026:1662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1662
8
reference_url https://access.redhat.com/errata/RHSA-2026:1909
reference_id RHSA-2026:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1909
9
reference_url https://access.redhat.com/errata/RHSA-2026:1946
reference_id RHSA-2026:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1946
10
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
11
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
12
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
13
reference_url https://access.redhat.com/errata/RHSA-2026:3277
reference_id RHSA-2026:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3277
14
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
15
reference_url https://access.redhat.com/errata/RHSA-2026:3388
reference_id RHSA-2026:3388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3388
fixed_packages
aliases CVE-2022-50865
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwpb-78dc-wuf7
10
url VCID-xhsu-dqfq-3fev
vulnerability_id VCID-xhsu-dqfq-3fev
summary kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53751
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07372
published_at 2026-04-07T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07427
published_at 2026-04-08T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-02T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-04T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09883
published_at 2026-04-16T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09858
published_at 2026-04-18T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-21T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10037
published_at 2026-04-24T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.10017
published_at 2026-04-26T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10049
published_at 2026-04-09T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10071
published_at 2026-04-11T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.1003
published_at 2026-04-12T12:55:00Z
12
value 0.00034
scoring_system epss
scoring_elements 0.10009
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419858
reference_id 2419858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2419858
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
6
reference_url https://access.redhat.com/errata/RHSA-2025:19447
reference_id RHSA-2025:19447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19447
7
reference_url https://access.redhat.com/errata/RHSA-2026:1512
reference_id RHSA-2026:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1512
8
reference_url https://access.redhat.com/errata/RHSA-2026:1886
reference_id RHSA-2026:1886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1886
9
reference_url https://access.redhat.com/errata/RHSA-2026:1909
reference_id RHSA-2026:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1909
10
reference_url https://access.redhat.com/errata/RHSA-2026:1946
reference_id RHSA-2026:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1946
11
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
12
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
13
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
14
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
fixed_packages
aliases CVE-2023-53751
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xhsu-dqfq-3fev
Fixing_vulnerabilities
Risk_score3.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.165.1%3Farch=el9_0