| 0 |
| url |
VCID-15kx-xvbj-pkbn |
| vulnerability_id |
VCID-15kx-xvbj-pkbn |
| summary |
kernel: igc: avoid kernel warning when changing RX ring parameters |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.2 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19955 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19897 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19875 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19877 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19765 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19926 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49227
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-15kx-xvbj-pkbn |
|
| 1 |
| url |
VCID-2qny-q8tf-wuae |
| vulnerability_id |
VCID-2qny-q8tf-wuae |
| summary |
kernel: avoid cyclic entity chains due to malformed USB descriptors |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-0404 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39435 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39428 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39411 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39462 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40023 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40034 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39863 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.4001 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40037 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39957 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.002 |
| scoring_system |
epss |
| scoring_elements |
0.4204 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.002 |
| scoring_system |
epss |
| scoring_elements |
0.41982 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.002 |
| scoring_system |
epss |
| scoring_elements |
0.41977 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-0404 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-0404
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2qny-q8tf-wuae |
|
| 2 |
| url |
VCID-37tv-2sfx-3qb8 |
| vulnerability_id |
VCID-37tv-2sfx-3qb8 |
| summary |
hw: cpu: intel: Branch History Injection (BHI) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52328 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52324 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52373 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52358 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52344 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52382 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52388 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52372 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52319 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.5904 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59113 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59136 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59101 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0001 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0001
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-37tv-2sfx-3qb8 |
|
| 3 |
| url |
VCID-3gu6-k1y3-pugu |
| vulnerability_id |
VCID-3gu6-k1y3-pugu |
| summary |
kernel: Linux kernel: integer overflow and information disclosure via undefined shift operation in drm/amdkfd |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4460 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.029 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02966 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03034 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02988 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03405 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02974 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0295 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02942 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02928 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03048 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03046 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4460 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4460
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3gu6-k1y3-pugu |
|
| 4 |
| url |
VCID-3wju-yesf-fbeu |
| vulnerability_id |
VCID-3wju-yesf-fbeu |
| summary |
kernel: dm: fix mempool NULL pointer race when completing IO |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47435 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01686 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01719 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.018 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01739 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01715 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01714 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01702 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01703 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01793 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01805 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01728 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01727 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0173 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47435 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47435
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3wju-yesf-fbeu |
|
| 5 |
| url |
VCID-6r94-k48y-3uc3 |
| vulnerability_id |
VCID-6r94-k48y-3uc3 |
| summary |
kernel: information leak in copy_page_to_iter() in iov_iter.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0850 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03702 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03692 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03699 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06845 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06932 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06963 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06955 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0695 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06869 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06767 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06892 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0850 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0850
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6r94-k48y-3uc3 |
|
| 6 |
| url |
VCID-6spq-ru85-nyhv |
| vulnerability_id |
VCID-6spq-ru85-nyhv |
| summary |
kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03183 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0324 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03167 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03298 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0329 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0325 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03257 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03263 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03284 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03194 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47501 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47501
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6spq-ru85-nyhv |
|
| 7 |
| url |
VCID-767a-utp1-gucs |
| vulnerability_id |
VCID-767a-utp1-gucs |
| summary |
kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3105 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0607 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06123 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06099 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06082 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06161 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06152 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06147 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06715 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06719 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0657 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06725 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3105 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3105
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-767a-utp1-gucs |
|
| 8 |
| url |
VCID-7m61-6vud-xbhc |
| vulnerability_id |
VCID-7m61-6vud-xbhc |
| summary |
kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03168 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50536 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50536
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7m61-6vud-xbhc |
|
| 9 |
| url |
VCID-7uzv-yevu-nudw |
| vulnerability_id |
VCID-7uzv-yevu-nudw |
| summary |
kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-40490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10589 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10721 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10777 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10792 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1076 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10736 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10599 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10614 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10738 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10795 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10645 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10855 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10896 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-40490 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-40490
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7uzv-yevu-nudw |
|
| 10 |
| url |
VCID-7vp7-hrcm-9bhe |
| vulnerability_id |
VCID-7vp7-hrcm-9bhe |
| summary |
kernel: speculation on incompletely validated data on IBM Power9 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4788 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41758 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41781 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.4184 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41864 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.4183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41817 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41867 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41841 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.4177 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41696 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00198 |
| scoring_system |
epss |
| scoring_elements |
0.41698 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-4788 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-4788
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7vp7-hrcm-9bhe |
|
| 11 |
| url |
VCID-8qm5-qkq2-ubc4 |
| vulnerability_id |
VCID-8qm5-qkq2-ubc4 |
| summary |
kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3744 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01305 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.013 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01775 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01774 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01733 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01776 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01792 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01805 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01798 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01786 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3744 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3744
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8qm5-qkq2-ubc4 |
|
| 12 |
| url |
VCID-9529-5dun-m7b4 |
| vulnerability_id |
VCID-9529-5dun-m7b4 |
| summary |
kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4093 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25562 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.2563 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.2555 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25561 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25519 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25462 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25467 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25456 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25424 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25388 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.0009 |
| scoring_system |
epss |
| scoring_elements |
0.25381 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4093 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4093
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9529-5dun-m7b4 |
|
| 13 |
| url |
VCID-976s-6zc1-8fer |
| vulnerability_id |
VCID-976s-6zc1-8fer |
| summary |
kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47614 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2098 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20658 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20795 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2078 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20662 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21038 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20752 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20831 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20892 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20864 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20812 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20803 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47614 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47614
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-976s-6zc1-8fer |
|
| 14 |
| url |
VCID-978p-j5hf-rqbq |
| vulnerability_id |
VCID-978p-j5hf-rqbq |
| summary |
kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08875 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08881 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08929 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0878 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08932 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08979 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08931 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08863 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0894 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08968 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08965 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08917 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08806 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47556 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47556
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-978p-j5hf-rqbq |
|
| 15 |
| url |
VCID-9gy8-st5c-7ue2 |
| vulnerability_id |
VCID-9gy8-st5c-7ue2 |
| summary |
kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26018 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26142 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25908 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25976 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26028 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26038 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25993 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25934 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25939 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25891 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25826 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25821 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4203
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9gy8-st5c-7ue2 |
|
| 16 |
| url |
VCID-9kjg-mavd-kqa3 |
| vulnerability_id |
VCID-9kjg-mavd-kqa3 |
| summary |
kernel: tcp: fix page frag corruption on page fault |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16923 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17088 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16796 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16872 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16875 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16912 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16816 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17141 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16918 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17007 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17066 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16994 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16934 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47544 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47544
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9kjg-mavd-kqa3 |
|
| 17 |
| url |
VCID-9nge-zp2p-p3cg |
| vulnerability_id |
VCID-9nge-zp2p-p3cg |
| summary |
kernel: information leak in the IPv6 implementation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45485 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73268 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00754 |
| scoring_system |
epss |
| scoring_elements |
0.73258 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73502 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73473 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73509 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73523 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.7353 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73522 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73547 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.7347 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.0077 |
| scoring_system |
epss |
| scoring_elements |
0.73479 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00874 |
| scoring_system |
epss |
| scoring_elements |
0.75301 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00874 |
| scoring_system |
epss |
| scoring_elements |
0.75336 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00874 |
| scoring_system |
epss |
| scoring_elements |
0.7534 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45485 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45485
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9nge-zp2p-p3cg |
|
| 18 |
| url |
VCID-a2t1-qbac-e3ag |
| vulnerability_id |
VCID-a2t1-qbac-e3ag |
| summary |
kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50510 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02965 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02975 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0296 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02902 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03027 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03016 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50510 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50510
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a2t1-qbac-e3ag |
|
| 19 |
| url |
VCID-aqgr-gkpx-g3ha |
| vulnerability_id |
VCID-aqgr-gkpx-g3ha |
| summary |
kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-43976 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19454 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19254 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19384 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19353 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19367 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19266 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19634 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19484 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19442 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-43976 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-43976
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aqgr-gkpx-g3ha |
|
| 20 |
| url |
VCID-az8z-5q7k-2ye9 |
| vulnerability_id |
VCID-az8z-5q7k-2ye9 |
| summary |
kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47076 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02529 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02441 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02448 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02552 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0254 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02463 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02464 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02487 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02459 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02458 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47076 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47076
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-az8z-5q7k-2ye9 |
|
| 21 |
| url |
VCID-bn7s-968w-hfgp |
| vulnerability_id |
VCID-bn7s-968w-hfgp |
| summary |
kernel: arm: SIGPAGE information disclosure vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21781 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03672 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03722 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03733 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03747 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03751 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03735 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03713 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03687 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03663 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03675 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03796 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03801 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03804 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-21781 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-21781
|
| risk_score |
1.8 |
| exploitability |
0.5 |
| weighted_severity |
3.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bn7s-968w-hfgp |
|
| 22 |
| url |
VCID-btf1-rxpb-27cw |
| vulnerability_id |
VCID-btf1-rxpb-27cw |
| summary |
kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3106 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28923 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28518 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28797 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28816 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28793 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28742 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.2863 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28886 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00107 |
| scoring_system |
epss |
| scoring_elements |
0.28892 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3106 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3106
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-btf1-rxpb-27cw |
|
| 23 |
| url |
VCID-c4ts-fd4y-pfak |
| vulnerability_id |
VCID-c4ts-fd4y-pfak |
| summary |
kernel: iommu/amd: Fix I/O page table memory leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48904 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07799 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07723 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07831 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07836 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07793 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.0785 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07869 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07861 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07834 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48904 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48904
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c4ts-fd4y-pfak |
|
| 24 |
| url |
VCID-ces5-sduy-9ffu |
| vulnerability_id |
VCID-ces5-sduy-9ffu |
| summary |
kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3773 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70803 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70958 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70862 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70914 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70894 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70948 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70818 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70836 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70811 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.7087 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70893 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00651 |
| scoring_system |
epss |
| scoring_elements |
0.70877 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3773 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3773
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ces5-sduy-9ffu |
|
| 25 |
| url |
VCID-cmjx-jabf-6ufz |
| vulnerability_id |
VCID-cmjx-jabf-6ufz |
| summary |
kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3759 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05116 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04939 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04888 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04898 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05044 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05075 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04904 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0498 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04995 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04976 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04957 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3759 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3759
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cmjx-jabf-6ufz |
|
| 26 |
| url |
VCID-crfn-kwyf-mfck |
| vulnerability_id |
VCID-crfn-kwyf-mfck |
| summary |
kernel: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50131 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06437 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19716 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19827 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19723 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50131 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50131
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-crfn-kwyf-mfck |
|
| 27 |
| url |
VCID-cs44-jrsv-vffr |
| vulnerability_id |
VCID-cs44-jrsv-vffr |
| summary |
kernel: sctp: Invalid chunks may be used to remotely remove existing associations |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3772 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37367 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37554 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37382 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37446 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37444 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37341 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37286 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37063 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00164 |
| scoring_system |
epss |
| scoring_elements |
0.37032 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3772 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3772
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cs44-jrsv-vffr |
|
| 28 |
| url |
VCID-cydx-ykad-7ke5 |
| vulnerability_id |
VCID-cydx-ykad-7ke5 |
| summary |
kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3108 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02109 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02113 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02127 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02104 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02542 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0245 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02555 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02531 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3108 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3108
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cydx-ykad-7ke5 |
|
| 29 |
| url |
VCID-d8tt-dyte-n3dw |
| vulnerability_id |
VCID-d8tt-dyte-n3dw |
| summary |
kernel: Buffer overwrite in decode_nfs_fh function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4157 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17175 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1734 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17259 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17317 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17331 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17281 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17223 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17161 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17203 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17108 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1709 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4157 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4157
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d8tt-dyte-n3dw |
|
| 30 |
| url |
VCID-dqmv-4ghe-xub3 |
| vulnerability_id |
VCID-dqmv-4ghe-xub3 |
| summary |
kernel: mptcp: fix deadlock in __mptcp_push_pending() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47590 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.022 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02228 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02169 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02255 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02236 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02198 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02157 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47590 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47590
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dqmv-4ghe-xub3 |
|
| 31 |
| url |
VCID-esdj-3j8r-83hv |
| vulnerability_id |
VCID-esdj-3j8r-83hv |
| summary |
kernel: information leak in the IPv4 implementation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45486 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23091 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23266 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23309 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23098 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23172 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23223 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23245 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23208 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2315 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23166 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23158 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2312 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22945 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22938 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45486 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45486
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-esdj-3j8r-83hv |
|
| 32 |
| url |
VCID-f8jk-dpun-tfgc |
| vulnerability_id |
VCID-f8jk-dpun-tfgc |
| summary |
kernel: perf trace: Really free the evsel->priv area |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53649 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53649 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53649
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f8jk-dpun-tfgc |
|
| 33 |
| url |
VCID-fnj5-8b82-k3gq |
| vulnerability_id |
VCID-fnj5-8b82-k3gq |
| summary |
kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25695 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25765 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25806 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25577 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25696 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25608 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2561 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25595 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25518 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2551 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0322
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj5-8b82-k3gq |
|
| 34 |
| url |
VCID-gs8w-v2yr-a7dg |
| vulnerability_id |
VCID-gs8w-v2yr-a7dg |
| summary |
kernel: possible use-after-free in bluetooth module |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3752 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13322 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13231 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13262 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13167 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13166 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13253 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13258 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13424 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.1345 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13246 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13328 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13379 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13348 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13311 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3752 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3752
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gs8w-v2yr-a7dg |
|
| 35 |
| url |
VCID-jwcy-jz4z-5bhr |
| vulnerability_id |
VCID-jwcy-jz4z-5bhr |
| summary |
kernel: igb: Fix use-after-free error during reset |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47301 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04859 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04917 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05131 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0499 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04971 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04953 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04901 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04911 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05057 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05089 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04993 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05008 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47301 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47301
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jwcy-jz4z-5bhr |
|
| 36 |
| url |
VCID-k7jb-9mt3-pude |
| vulnerability_id |
VCID-k7jb-9mt3-pude |
| summary |
kernel: ppc: kvm: allows a malicious KVM guest to crash the host |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-43056 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06209 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06464 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06426 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06441 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06243 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06274 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06254 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06299 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0634 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06332 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06327 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06315 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06279 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-43056 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-43056
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k7jb-9mt3-pude |
|
| 37 |
| url |
VCID-myhs-bxz5-13bh |
| vulnerability_id |
VCID-myhs-bxz5-13bh |
| summary |
kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3743 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01874 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01956 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01915 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01895 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01894 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01975 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0196 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01924 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01937 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01951 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.01936 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0192 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3743 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3743
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-myhs-bxz5-13bh |
|
| 38 |
| url |
VCID-n49a-3z3m-ukej |
| vulnerability_id |
VCID-n49a-3z3m-ukej |
| summary |
kernel: use-after-free in nouveau kernel module |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-27820 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06539 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06603 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06646 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06709 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06702 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06693 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06619 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06437 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06453 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06477 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-27820 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-27820
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n49a-3z3m-ukej |
|
| 39 |
| url |
VCID-npk2-d7vh-4fhd |
| vulnerability_id |
VCID-npk2-d7vh-4fhd |
| summary |
kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08605 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08662 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08665 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0854 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08695 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08707 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08631 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08603 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0868 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08704 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41864 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-41864
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-npk2-d7vh-4fhd |
|
| 40 |
| url |
VCID-pqcc-bjwr-q7f3 |
| vulnerability_id |
VCID-pqcc-bjwr-q7f3 |
| summary |
kernel: scsi: target: core: Avoid smp_processor_id() in preemptible code |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04471 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04509 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04754 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04532 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04541 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04678 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04718 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04535 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04548 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04584 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04599 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04589 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04556 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47178
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pqcc-bjwr-q7f3 |
|
| 41 |
| url |
VCID-py6r-aqaw-73hg |
| vulnerability_id |
VCID-py6r-aqaw-73hg |
| summary |
kernel: RDMA/core: Make sure "ib_port" is valid when access sysfs node |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03238 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50475 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50475
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-py6r-aqaw-73hg |
|
| 42 |
| url |
VCID-q518-8f8w-x7ea |
| vulnerability_id |
VCID-q518-8f8w-x7ea |
| summary |
kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33151 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.3338 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33356 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33323 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33168 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33326 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33372 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.3341 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33368 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33346 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34819 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34845 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34603 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20322
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q518-8f8w-x7ea |
|
| 43 |
| url |
VCID-q9fn-q4hm-cygt |
| vulnerability_id |
VCID-q9fn-q4hm-cygt |
| summary |
kernel: Local denial of service in bond_ipsec_add_sa |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22768 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22979 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22943 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22773 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28367 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28475 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28435 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28429 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28522 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28565 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0286 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0286
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q9fn-q4hm-cygt |
|
| 44 |
| url |
VCID-r314-48hu-gfb5 |
| vulnerability_id |
VCID-r314-48hu-gfb5 |
| summary |
kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-43389 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.018 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01898 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01823 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01822 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01908 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01902 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01842 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01856 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0186 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01861 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01845 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-43389 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-43389
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r314-48hu-gfb5 |
|
| 45 |
| url |
VCID-ragr-wgmc-pbe3 |
| vulnerability_id |
VCID-ragr-wgmc-pbe3 |
| summary |
kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3612 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25148 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.24975 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25073 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25085 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25075 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25047 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.24986 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25267 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25041 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.2511 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25155 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25168 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00088 |
| scoring_system |
epss |
| scoring_elements |
0.25126 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3612 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3612
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ragr-wgmc-pbe3 |
|
| 46 |
| url |
VCID-rhh5-t7x7-77bt |
| vulnerability_id |
VCID-rhh5-t7x7-77bt |
| summary |
kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1011 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43019 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43159 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43149 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43083 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00207 |
| scoring_system |
epss |
| scoring_elements |
0.43017 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44485 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44541 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44558 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44528 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44529 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44457 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44536 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44527 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00219 |
| scoring_system |
epss |
| scoring_elements |
0.44548 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1011 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1011
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhh5-t7x7-77bt |
|
| 47 |
| url |
VCID-rkc9-5rqz-2qap |
| vulnerability_id |
VCID-rkc9-5rqz-2qap |
| summary |
kernel: Copy_from_user on 64-bit versions may leak kernel information |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0459 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01348 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01448 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01352 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01342 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01357 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01436 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01444 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01353 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01368 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01356 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0135 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-0459 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-0459
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rkc9-5rqz-2qap |
|
| 48 |
| url |
VCID-s6wh-1hrj-xqd7 |
| vulnerability_id |
VCID-s6wh-1hrj-xqd7 |
| summary |
kernel: use-after-free in the TEE subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44733 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51072 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.5115 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51163 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51159 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51204 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51182 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51167 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51213 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51136 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00277 |
| scoring_system |
epss |
| scoring_elements |
0.51144 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44733 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-44733
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s6wh-1hrj-xqd7 |
|
| 49 |
| url |
VCID-shy5-t49f-pfb9 |
| vulnerability_id |
VCID-shy5-t49f-pfb9 |
| summary |
kernel: possible leak or coruption of data residing on hugetlbfs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05243 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05512 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05344 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05291 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05292 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05431 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05471 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05286 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05318 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05373 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05396 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05365 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05353 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4002 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4002
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-shy5-t49f-pfb9 |
|
| 50 |
| url |
VCID-sz2h-5ef2-zba5 |
| vulnerability_id |
VCID-sz2h-5ef2-zba5 |
| summary |
kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29154 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10922 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10917 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11024 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10878 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10889 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11006 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10962 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11122 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10943 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11021 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11075 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11078 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11047 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-29154 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-29154
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sz2h-5ef2-zba5 |
|
| 51 |
| url |
VCID-t49z-au64-uyf8 |
| vulnerability_id |
VCID-t49z-au64-uyf8 |
| summary |
kernel: stack information leak in infiniband RDMA |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3923 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02168 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02239 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02241 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02244 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02242 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02264 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02247 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02236 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02234 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03385 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03256 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03265 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03374 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3923 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3923
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t49z-au64-uyf8 |
|
| 52 |
| url |
VCID-tenk-bzzp-ake8 |
| vulnerability_id |
VCID-tenk-bzzp-ake8 |
| summary |
kernel: security regression for CVE-2018-13405 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4037 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10541 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10686 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10749 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10608 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10681 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10736 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1075 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10695 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10557 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10573 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10702 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10653 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1065 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4037 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4037
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tenk-bzzp-ake8 |
|
| 53 |
| url |
VCID-ttj8-jrsa-u3e4 |
| vulnerability_id |
VCID-ttj8-jrsa-u3e4 |
| summary |
kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-0941 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19056 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19191 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19244 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19039 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19094 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19099 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19053 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19001 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18955 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18968 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18866 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18847 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-0941 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-0941
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ttj8-jrsa-u3e4 |
|
| 54 |
| url |
VCID-u4gb-1hyn-m7g4 |
| vulnerability_id |
VCID-u4gb-1hyn-m7g4 |
| summary |
kernel: fget: check that the fd still exists after getting a ref to it |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4083 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01551 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01564 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01568 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01571 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01581 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01563 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01562 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01566 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01654 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01663 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0166 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4083 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4083
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u4gb-1hyn-m7g4 |
|
| 55 |
| url |
VCID-v597-1p28-2qbb |
| vulnerability_id |
VCID-v597-1p28-2qbb |
| summary |
kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48771 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10112 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10124 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10208 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10247 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10187 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1006 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10037 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10168 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10145 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10148 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48771 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48771
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v597-1p28-2qbb |
|
| 56 |
| url |
VCID-vmwk-vcvx-jyff |
| vulnerability_id |
VCID-vmwk-vcvx-jyff |
| summary |
kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47203 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03299 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03349 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.034 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03401 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03358 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0333 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03309 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03285 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03296 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03411 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03397 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03361 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03376 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47203 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47203
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vmwk-vcvx-jyff |
|
| 57 |
| url |
VCID-vnt5-rgu1-xkcw |
| vulnerability_id |
VCID-vnt5-rgu1-xkcw |
| summary |
kernel: DoS in ccp_run_aes_gcm_cmd() function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3764 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04577 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04868 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04681 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04648 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04656 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04795 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04829 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04661 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04709 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04721 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04698 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3764 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3764
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vnt5-rgu1-xkcw |
|
| 58 |
| url |
VCID-vq7y-fpac-p7c1 |
| vulnerability_id |
VCID-vq7y-fpac-p7c1 |
| summary |
kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13974 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26371 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26423 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26466 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2624 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26308 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26356 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26364 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26319 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2626 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26206 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26131 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26127 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13974 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-13974
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vq7y-fpac-p7c1 |
|
| 59 |
| url |
VCID-vuzj-f6kq-jqfv |
| vulnerability_id |
VCID-vuzj-f6kq-jqfv |
| summary |
hw: cpu: intel: Intra-Mode BTI |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71851 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71971 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.7186 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71879 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71852 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.7189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71901 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71926 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71908 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71891 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71933 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71937 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71921 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.00695 |
| scoring_system |
epss |
| scoring_elements |
0.71965 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0002 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0002
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vuzj-f6kq-jqfv |
|
| 60 |
| url |
VCID-whfj-b8tn-5kgc |
| vulnerability_id |
VCID-whfj-b8tn-5kgc |
| summary |
kernel: Heap buffer overflow in firedtv driver |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42739 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29432 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29099 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29378 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29398 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29372 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29327 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29213 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29497 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29545 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29366 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.2943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29471 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.0011 |
| scoring_system |
epss |
| scoring_elements |
0.29475 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42739 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42739
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-whfj-b8tn-5kgc |
|
| 61 |
| url |
VCID-wqrb-v41r-y7bn |
| vulnerability_id |
VCID-wqrb-v41r-y7bn |
| summary |
kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3669 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04684 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04956 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04773 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04726 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04735 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0488 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04917 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04746 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04768 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04783 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04828 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04793 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3669 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3669
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wqrb-v41r-y7bn |
|
| 62 |
| url |
VCID-x8qp-4p75-xbfc |
| vulnerability_id |
VCID-x8qp-4p75-xbfc |
| summary |
kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-37159 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09964 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0997 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09999 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10527 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10509 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10488 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1063 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10692 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10555 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10628 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10669 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10644 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-37159 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-37159
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8qp-4p75-xbfc |
|
| 63 |
| url |
VCID-xtbh-wee7-3qgj |
| vulnerability_id |
VCID-xtbh-wee7-3qgj |
| summary |
kernel: dm rq: don't queue request to blk-mq during DM suspend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06789 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06872 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07026 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06991 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06996 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06987 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06983 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06904 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0704 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.07024 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06921 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06905 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0696 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47498 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47498
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xtbh-wee7-3qgj |
|
| 64 |
| url |
VCID-yxeb-ww1y-yfg6 |
| vulnerability_id |
VCID-yxeb-ww1y-yfg6 |
| summary |
kernel: wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53570 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01868 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01871 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0187 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0183 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01829 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01914 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01908 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01904 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53570 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53570
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yxeb-ww1y-yfg6 |
|
| 65 |
| url |
VCID-z4rz-94cg-wfby |
| vulnerability_id |
VCID-z4rz-94cg-wfby |
| summary |
hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26401 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32681 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32813 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32849 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.3267 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32718 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32745 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32709 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32722 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32699 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32516 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.324 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-26401 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-26401
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z4rz-94cg-wfby |
|
| 66 |
| url |
VCID-zt7m-55n5-3ygp |
| vulnerability_id |
VCID-zt7m-55n5-3ygp |
| summary |
kernel: cgroup: Use open-time creds and namespace for migration perm checks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02257 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02381 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02322 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02307 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02313 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02411 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02339 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02334 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02359 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02337 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02323 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-4197 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-4197
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zt7m-55n5-3ygp |
|