Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@4.18.0-553.94.1?arch=el8_10
Typerpm
Namespaceredhat
Namekernel
Version4.18.0-553.94.1
Qualifiers
arch el8_10
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4pfh-69kg-17bc
vulnerability_id VCID-4pfh-69kg-17bc
summary kernel: smb: client: Fix use-after-free in cifs_fill_dirent
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38051.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38051.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-38051
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08673
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08664
published_at 2026-04-07T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08764
published_at 2026-04-09T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08765
published_at 2026-04-11T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.0874
published_at 2026-04-08T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08743
published_at 2026-04-12T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08728
published_at 2026-04-13T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.23907
published_at 2026-04-24T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24062
published_at 2026-04-16T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24051
published_at 2026-04-18T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-38051
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38051
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373329
reference_id 2373329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373329
5
reference_url https://access.redhat.com/errata/RHSA-2026:0533
reference_id RHSA-2026:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0533
6
reference_url https://access.redhat.com/errata/RHSA-2026:0536
reference_id RHSA-2026:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0536
7
reference_url https://access.redhat.com/errata/RHSA-2026:0643
reference_id RHSA-2026:0643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0643
8
reference_url https://access.redhat.com/errata/RHSA-2026:0759
reference_id RHSA-2026:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0759
9
reference_url https://access.redhat.com/errata/RHSA-2026:0760
reference_id RHSA-2026:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0760
10
reference_url https://access.redhat.com/errata/RHSA-2026:1445
reference_id RHSA-2026:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1445
11
reference_url https://access.redhat.com/errata/RHSA-2026:1494
reference_id RHSA-2026:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1494
12
reference_url https://access.redhat.com/errata/RHSA-2026:1495
reference_id RHSA-2026:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1495
13
reference_url https://access.redhat.com/errata/RHSA-2026:1879
reference_id RHSA-2026:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1879
14
reference_url https://access.redhat.com/errata/RHSA-2026:2352
reference_id RHSA-2026:2352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2352
15
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
16
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
17
reference_url https://access.redhat.com/errata/RHSA-2026:2761
reference_id RHSA-2026:2761
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2761
18
reference_url https://usn.ubuntu.com/7704-1/
reference_id USN-7704-1
reference_type
scores
url https://usn.ubuntu.com/7704-1/
19
reference_url https://usn.ubuntu.com/7704-2/
reference_id USN-7704-2
reference_type
scores
url https://usn.ubuntu.com/7704-2/
20
reference_url https://usn.ubuntu.com/7704-3/
reference_id USN-7704-3
reference_type
scores
url https://usn.ubuntu.com/7704-3/
21
reference_url https://usn.ubuntu.com/7704-4/
reference_id USN-7704-4
reference_type
scores
url https://usn.ubuntu.com/7704-4/
22
reference_url https://usn.ubuntu.com/7704-5/
reference_id USN-7704-5
reference_type
scores
url https://usn.ubuntu.com/7704-5/
23
reference_url https://usn.ubuntu.com/7711-1/
reference_id USN-7711-1
reference_type
scores
url https://usn.ubuntu.com/7711-1/
24
reference_url https://usn.ubuntu.com/7712-1/
reference_id USN-7712-1
reference_type
scores
url https://usn.ubuntu.com/7712-1/
25
reference_url https://usn.ubuntu.com/7712-2/
reference_id USN-7712-2
reference_type
scores
url https://usn.ubuntu.com/7712-2/
26
reference_url https://usn.ubuntu.com/7769-1/
reference_id USN-7769-1
reference_type
scores
url https://usn.ubuntu.com/7769-1/
27
reference_url https://usn.ubuntu.com/7769-2/
reference_id USN-7769-2
reference_type
scores
url https://usn.ubuntu.com/7769-2/
28
reference_url https://usn.ubuntu.com/7769-3/
reference_id USN-7769-3
reference_type
scores
url https://usn.ubuntu.com/7769-3/
29
reference_url https://usn.ubuntu.com/7770-1/
reference_id USN-7770-1
reference_type
scores
url https://usn.ubuntu.com/7770-1/
30
reference_url https://usn.ubuntu.com/7771-1/
reference_id USN-7771-1
reference_type
scores
url https://usn.ubuntu.com/7771-1/
31
reference_url https://usn.ubuntu.com/7789-1/
reference_id USN-7789-1
reference_type
scores
url https://usn.ubuntu.com/7789-1/
32
reference_url https://usn.ubuntu.com/7789-2/
reference_id USN-7789-2
reference_type
scores
url https://usn.ubuntu.com/7789-2/
33
reference_url https://usn.ubuntu.com/8028-1/
reference_id USN-8028-1
reference_type
scores
url https://usn.ubuntu.com/8028-1/
34
reference_url https://usn.ubuntu.com/8028-2/
reference_id USN-8028-2
reference_type
scores
url https://usn.ubuntu.com/8028-2/
35
reference_url https://usn.ubuntu.com/8028-3/
reference_id USN-8028-3
reference_type
scores
url https://usn.ubuntu.com/8028-3/
36
reference_url https://usn.ubuntu.com/8028-4/
reference_id USN-8028-4
reference_type
scores
url https://usn.ubuntu.com/8028-4/
37
reference_url https://usn.ubuntu.com/8028-5/
reference_id USN-8028-5
reference_type
scores
url https://usn.ubuntu.com/8028-5/
38
reference_url https://usn.ubuntu.com/8028-6/
reference_id USN-8028-6
reference_type
scores
url https://usn.ubuntu.com/8028-6/
39
reference_url https://usn.ubuntu.com/8028-7/
reference_id USN-8028-7
reference_type
scores
url https://usn.ubuntu.com/8028-7/
40
reference_url https://usn.ubuntu.com/8028-8/
reference_id USN-8028-8
reference_type
scores
url https://usn.ubuntu.com/8028-8/
41
reference_url https://usn.ubuntu.com/8031-1/
reference_id USN-8031-1
reference_type
scores
url https://usn.ubuntu.com/8031-1/
42
reference_url https://usn.ubuntu.com/8031-2/
reference_id USN-8031-2
reference_type
scores
url https://usn.ubuntu.com/8031-2/
43
reference_url https://usn.ubuntu.com/8031-3/
reference_id USN-8031-3
reference_type
scores
url https://usn.ubuntu.com/8031-3/
44
reference_url https://usn.ubuntu.com/8052-1/
reference_id USN-8052-1
reference_type
scores
url https://usn.ubuntu.com/8052-1/
45
reference_url https://usn.ubuntu.com/8052-2/
reference_id USN-8052-2
reference_type
scores
url https://usn.ubuntu.com/8052-2/
46
reference_url https://usn.ubuntu.com/8074-1/
reference_id USN-8074-1
reference_type
scores
url https://usn.ubuntu.com/8074-1/
47
reference_url https://usn.ubuntu.com/8074-2/
reference_id USN-8074-2
reference_type
scores
url https://usn.ubuntu.com/8074-2/
48
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
fixed_packages
aliases CVE-2025-38051
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pfh-69kg-17bc
1
url VCID-c49r-knse-6bc5
vulnerability_id VCID-c49r-knse-6bc5
summary kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39933.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-39933
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04764
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04779
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0479
published_at 2026-04-12T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0477
published_at 2026-04-13T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04731
published_at 2026-04-18T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04912
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-39933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39933
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401432
reference_id 2401432
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401432
5
reference_url https://access.redhat.com/errata/RHSA-2026:0759
reference_id RHSA-2026:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0759
6
reference_url https://access.redhat.com/errata/RHSA-2026:0760
reference_id RHSA-2026:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0760
7
reference_url https://access.redhat.com/errata/RHSA-2026:0793
reference_id RHSA-2026:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0793
8
reference_url https://access.redhat.com/errata/RHSA-2026:1727
reference_id RHSA-2026:1727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1727
9
reference_url https://access.redhat.com/errata/RHSA-2026:2282
reference_id RHSA-2026:2282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2282
10
reference_url https://access.redhat.com/errata/RHSA-2026:2759
reference_id RHSA-2026:2759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2759
11
reference_url https://access.redhat.com/errata/RHSA-2026:2766
reference_id RHSA-2026:2766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2766
12
reference_url https://access.redhat.com/errata/RHSA-2026:3267
reference_id RHSA-2026:3267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3267
13
reference_url https://access.redhat.com/errata/RHSA-2026:3268
reference_id RHSA-2026:3268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3268
14
reference_url https://access.redhat.com/errata/RHSA-2026:3277
reference_id RHSA-2026:3277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3277
15
reference_url https://access.redhat.com/errata/RHSA-2026:3293
reference_id RHSA-2026:3293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3293
16
reference_url https://access.redhat.com/errata/RHSA-2026:3358
reference_id RHSA-2026:3358
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3358
17
reference_url https://access.redhat.com/errata/RHSA-2026:3360
reference_id RHSA-2026:3360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3360
18
reference_url https://access.redhat.com/errata/RHSA-2026:3375
reference_id RHSA-2026:3375
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3375
fixed_packages
aliases CVE-2025-39933
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c49r-knse-6bc5
2
url VCID-e2pp-vkfh-4qej
vulnerability_id VCID-e2pp-vkfh-4qej
summary kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40096.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-40096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-40096
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12644
published_at 2026-04-04T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12452
published_at 2026-04-07T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12532
published_at 2026-04-08T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12603
published_at 2026-04-02T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17502
published_at 2026-04-16T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17511
published_at 2026-04-18T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17545
published_at 2026-04-21T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17455
published_at 2026-04-24T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17638
published_at 2026-04-09T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17656
published_at 2026-04-11T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.1761
published_at 2026-04-12T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17557
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-40096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2407333
reference_id 2407333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2407333
5
reference_url https://access.redhat.com/errata/RHSA-2026:0759
reference_id RHSA-2026:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0759
6
reference_url https://access.redhat.com/errata/RHSA-2026:0760
reference_id RHSA-2026:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0760
7
reference_url https://access.redhat.com/errata/RHSA-2026:1879
reference_id RHSA-2026:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1879
8
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
9
reference_url https://access.redhat.com/errata/RHSA-2026:2560
reference_id RHSA-2026:2560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2560
10
reference_url https://access.redhat.com/errata/RHSA-2026:2583
reference_id RHSA-2026:2583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2583
11
reference_url https://access.redhat.com/errata/RHSA-2026:3275
reference_id RHSA-2026:3275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3275
12
reference_url https://access.redhat.com/errata/RHSA-2026:6153
reference_id RHSA-2026:6153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6153
13
reference_url https://access.redhat.com/errata/RHSA-2026:6164
reference_id RHSA-2026:6164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6164
14
reference_url https://access.redhat.com/errata/RHSA-2026:6193
reference_id RHSA-2026:6193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6193
15
reference_url https://usn.ubuntu.com/8029-1/
reference_id USN-8029-1
reference_type
scores
url https://usn.ubuntu.com/8029-1/
16
reference_url https://usn.ubuntu.com/8029-2/
reference_id USN-8029-2
reference_type
scores
url https://usn.ubuntu.com/8029-2/
17
reference_url https://usn.ubuntu.com/8029-3/
reference_id USN-8029-3
reference_type
scores
url https://usn.ubuntu.com/8029-3/
18
reference_url https://usn.ubuntu.com/8030-1/
reference_id USN-8030-1
reference_type
scores
url https://usn.ubuntu.com/8030-1/
19
reference_url https://usn.ubuntu.com/8048-1/
reference_id USN-8048-1
reference_type
scores
url https://usn.ubuntu.com/8048-1/
20
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
21
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
22
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
23
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
24
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
25
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
26
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
27
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
28
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-40096
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2pp-vkfh-4qej
3
url VCID-qfge-zawt-qyb3
vulnerability_id VCID-qfge-zawt-qyb3
summary kernel: net: atlantic: fix fragment overflow handling in RX path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-68301
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16694
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16755
published_at 2026-04-04T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16546
published_at 2026-04-07T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16631
published_at 2026-04-08T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16684
published_at 2026-04-09T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16662
published_at 2026-04-11T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16621
published_at 2026-04-12T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16561
published_at 2026-04-13T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16499
published_at 2026-04-16T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20877
published_at 2026-04-24T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21026
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21004
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-68301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2422836
reference_id 2422836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2422836
5
reference_url https://access.redhat.com/errata/RHSA-2026:0759
reference_id RHSA-2026:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0759
6
reference_url https://access.redhat.com/errata/RHSA-2026:0760
reference_id RHSA-2026:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0760
7
reference_url https://access.redhat.com/errata/RHSA-2026:1143
reference_id RHSA-2026:1143
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1143
8
reference_url https://access.redhat.com/errata/RHSA-2026:1690
reference_id RHSA-2026:1690
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1690
9
reference_url https://access.redhat.com/errata/RHSA-2026:1703
reference_id RHSA-2026:1703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1703
10
reference_url https://access.redhat.com/errata/RHSA-2026:1727
reference_id RHSA-2026:1727
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1727
11
reference_url https://access.redhat.com/errata/RHSA-2026:1879
reference_id RHSA-2026:1879
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1879
12
reference_url https://access.redhat.com/errata/RHSA-2026:1886
reference_id RHSA-2026:1886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1886
13
reference_url https://access.redhat.com/errata/RHSA-2026:1909
reference_id RHSA-2026:1909
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1909
14
reference_url https://access.redhat.com/errata/RHSA-2026:1946
reference_id RHSA-2026:1946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1946
15
reference_url https://access.redhat.com/errata/RHSA-2026:2490
reference_id RHSA-2026:2490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2490
16
reference_url https://access.redhat.com/errata/RHSA-2026:2535
reference_id RHSA-2026:2535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2535
17
reference_url https://access.redhat.com/errata/RHSA-2026:2573
reference_id RHSA-2026:2573
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2573
18
reference_url https://access.redhat.com/errata/RHSA-2026:2577
reference_id RHSA-2026:2577
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2577
19
reference_url https://access.redhat.com/errata/RHSA-2026:2664
reference_id RHSA-2026:2664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2664
20
reference_url https://usn.ubuntu.com/8094-1/
reference_id USN-8094-1
reference_type
scores
url https://usn.ubuntu.com/8094-1/
21
reference_url https://usn.ubuntu.com/8094-2/
reference_id USN-8094-2
reference_type
scores
url https://usn.ubuntu.com/8094-2/
22
reference_url https://usn.ubuntu.com/8094-3/
reference_id USN-8094-3
reference_type
scores
url https://usn.ubuntu.com/8094-3/
23
reference_url https://usn.ubuntu.com/8094-4/
reference_id USN-8094-4
reference_type
scores
url https://usn.ubuntu.com/8094-4/
24
reference_url https://usn.ubuntu.com/8094-5/
reference_id USN-8094-5
reference_type
scores
url https://usn.ubuntu.com/8094-5/
25
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
26
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
27
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
28
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
29
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
30
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
31
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
32
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
33
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
34
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
35
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
36
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
37
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
38
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
39
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
40
reference_url https://usn.ubuntu.com/8152-1/
reference_id USN-8152-1
reference_type
scores
url https://usn.ubuntu.com/8152-1/
41
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
42
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
43
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-68301
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfge-zawt-qyb3
4
url VCID-qpq9-r7ew-qbg3
vulnerability_id VCID-qpq9-r7ew-qbg3
summary kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53552.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53552
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.01923
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01937
published_at 2026-04-04T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01936
published_at 2026-04-08T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.0195
published_at 2026-04-09T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.01935
published_at 2026-04-11T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.01919
published_at 2026-04-12T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.01914
published_at 2026-04-13T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.01895
published_at 2026-04-16T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.01893
published_at 2026-04-18T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.01981
published_at 2026-04-21T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.01967
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53552
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401514
reference_id 2401514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401514
4
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
7
reference_url https://access.redhat.com/errata/RHSA-2026:0759
reference_id RHSA-2026:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0759
8
reference_url https://access.redhat.com/errata/RHSA-2026:0760
reference_id RHSA-2026:0760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:0760
9
reference_url https://access.redhat.com/errata/RHSA-2026:1441
reference_id RHSA-2026:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1441
10
reference_url https://access.redhat.com/errata/RHSA-2026:1443
reference_id RHSA-2026:1443
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1443
11
reference_url https://access.redhat.com/errata/RHSA-2026:1445
reference_id RHSA-2026:1445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1445
fixed_packages
aliases CVE-2023-53552
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpq9-r7ew-qbg3
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-553.94.1%3Farch=el8_10