| 0 |
| url |
VCID-139u-14px-uucw |
| vulnerability_id |
VCID-139u-14px-uucw |
| summary |
kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21698 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21526 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21727 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49663 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49663
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-139u-14px-uucw |
|
| 1 |
|
| 2 |
| url |
VCID-15kx-xvbj-pkbn |
| vulnerability_id |
VCID-15kx-xvbj-pkbn |
| summary |
kernel: igc: avoid kernel warning when changing RX ring parameters |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.2 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19955 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19897 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19875 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19877 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19926 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49227
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-15kx-xvbj-pkbn |
|
| 3 |
| url |
VCID-18e7-kygq-cbay |
| vulnerability_id |
VCID-18e7-kygq-cbay |
| summary |
kernel: igc: Reinstate IGC_REMOVED logic and implement it properly |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49605 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12919 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12968 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35002 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34942 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34981 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34965 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34921 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34692 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34924 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34969 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49605 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49605
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-18e7-kygq-cbay |
|
| 4 |
| url |
VCID-18mv-aj8j-2qg2 |
| vulnerability_id |
VCID-18mv-aj8j-2qg2 |
| summary |
kernel: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49398 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23775 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23731 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23675 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23656 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23544 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23713 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49398 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49398
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-18mv-aj8j-2qg2 |
|
| 5 |
| url |
VCID-19fj-8ey8-2fep |
| vulnerability_id |
VCID-19fj-8ey8-2fep |
| summary |
kernel: ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49348 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07234 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07135 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07259 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07159 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07214 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07245 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07243 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0723 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0722 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10417 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49348 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49348
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-19fj-8ey8-2fep |
|
| 6 |
| url |
VCID-1bzf-phe4-a7bt |
| vulnerability_id |
VCID-1bzf-phe4-a7bt |
| summary |
kernel: bpf, cpumap: Handle skb as well when clean up ptr_ring |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03231 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03142 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03116 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03123 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03243 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53660 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53660
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1bzf-phe4-a7bt |
|
| 7 |
| url |
VCID-24k6-kgcc-fkev |
| vulnerability_id |
VCID-24k6-kgcc-fkev |
| summary |
kernel: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16113 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16167 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16184 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16221 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16206 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16356 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16337 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16298 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1623 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.1802 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18074 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49145 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49145
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-24k6-kgcc-fkev |
|
| 8 |
| url |
VCID-2a7t-t8ex-nkch |
| vulnerability_id |
VCID-2a7t-t8ex-nkch |
| summary |
kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49426 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33454 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.3386 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33892 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33891 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33849 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33847 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33816 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49426 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49426
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2a7t-t8ex-nkch |
|
| 9 |
| url |
VCID-2jda-3qf9-6kg2 |
| vulnerability_id |
VCID-2jda-3qf9-6kg2 |
| summary |
kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47580 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03207 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03252 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03248 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03204 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03156 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0313 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03137 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03257 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03216 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03224 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47580 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47580
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2jda-3qf9-6kg2 |
|
| 10 |
| url |
VCID-2uap-2vm1-efcr |
| vulnerability_id |
VCID-2uap-2vm1-efcr |
| summary |
Retbleed - arbitrary speculative code execution with return instructions |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29900 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80477 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80527 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80531 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80523 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80554 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80558 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80498 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.01411 |
| scoring_system |
epss |
| scoring_elements |
0.80517 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29900 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29900
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr |
|
| 11 |
| url |
VCID-2uct-bxdp-4ygm |
| vulnerability_id |
VCID-2uct-bxdp-4ygm |
| summary |
kernel: RDMA/hfi1: Fix potential integer multiplication overflow errors |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49404 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01423 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09788 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13653 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13736 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13786 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13718 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13668 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13579 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13649 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49404 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49404
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2uct-bxdp-4ygm |
|
| 12 |
| url |
VCID-3auk-78hr-2kg6 |
| vulnerability_id |
VCID-3auk-78hr-2kg6 |
| summary |
kernel: PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49265 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.1998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.2 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19955 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19897 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19875 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19879 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19877 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19772 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19926 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49265 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49265
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3auk-78hr-2kg6 |
|
| 13 |
| url |
VCID-3cn4-nfwc-eff5 |
| vulnerability_id |
VCID-3cn4-nfwc-eff5 |
| summary |
kernel: dm raid: fix address sanitizer warning in raid_resume |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50085 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06416 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06508 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06505 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06488 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19918 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50085 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50085
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3cn4-nfwc-eff5 |
|
| 14 |
| url |
VCID-3dsb-ehey-3ycd |
| vulnerability_id |
VCID-3dsb-ehey-3ycd |
| summary |
kernel: bfq: Avoid merging queues with different parents |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49412 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08643 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08591 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33594 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33968 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.3401 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33998 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33974 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33996 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33963 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49412 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49412
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3dsb-ehey-3ycd |
|
| 15 |
| url |
VCID-3tj9-e9p3-kyc3 |
| vulnerability_id |
VCID-3tj9-e9p3-kyc3 |
| summary |
kernel: usb: dwc3: host: Stop setting the ACPI companion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49306 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21698 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21526 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21727 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22358 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49306 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49306
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3tj9-e9p3-kyc3 |
|
| 16 |
| url |
VCID-3zrw-j38p-e7dw |
| vulnerability_id |
VCID-3zrw-j38p-e7dw |
| summary |
kernel: ext4: add reserved GDT blocks check |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49707 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01078 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01032 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01037 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0102 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01015 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01014 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01076 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08089 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49707 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49707
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3zrw-j38p-e7dw |
|
| 17 |
| url |
VCID-4429-qf2w-jqg3 |
| vulnerability_id |
VCID-4429-qf2w-jqg3 |
| summary |
x86: MMIO Stale Data vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40284 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40015 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40309 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40231 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40308 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.4027 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40251 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40298 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40266 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.4019 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21166, XSA-404
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3 |
|
| 18 |
| url |
VCID-4qha-wssr-xycg |
| vulnerability_id |
VCID-4qha-wssr-xycg |
| summary |
kernel: nf_tables disallow binding to already bound chain |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39190 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15382 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15286 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15292 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1534 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15457 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15507 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15471 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15433 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15368 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18029 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.18083 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-39190 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-39190
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4qha-wssr-xycg |
|
| 19 |
| url |
VCID-4r38-vuty-qfdw |
| vulnerability_id |
VCID-4r38-vuty-qfdw |
| summary |
kernel: ext4: avoid cycles in directory h-tree |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08089 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15282 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15252 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15213 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15149 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15062 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15071 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15122 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15161 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15143 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15231 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49343 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49343
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4r38-vuty-qfdw |
|
| 20 |
| url |
VCID-4w5c-d8pd-uqeb |
| vulnerability_id |
VCID-4w5c-d8pd-uqeb |
| summary |
kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29581 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40141 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40337 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.4028 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40327 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.40296 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00185 |
| scoring_system |
epss |
| scoring_elements |
0.4022 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42113 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42163 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42175 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60155 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60181 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29581 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29581
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4w5c-d8pd-uqeb |
|
| 21 |
| url |
VCID-4xaf-p3np-2kbp |
| vulnerability_id |
VCID-4xaf-p3np-2kbp |
| summary |
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04172 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04134 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04153 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04203 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04218 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04182 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04158 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05153 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05307 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05155 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05346 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1158 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1158
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4xaf-p3np-2kbp |
|
| 22 |
| url |
VCID-5149-phe6-eqh5 |
| vulnerability_id |
VCID-5149-phe6-eqh5 |
| summary |
kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36946 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89823 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.8976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89796 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89809 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89807 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.898 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89814 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.05077 |
| scoring_system |
epss |
| scoring_elements |
0.89808 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-36946 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-36946
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5149-phe6-eqh5 |
|
| 23 |
| url |
VCID-56gq-qmzj-1yaj |
| vulnerability_id |
VCID-56gq-qmzj-1yaj |
| summary |
kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47639 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05307 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05114 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05118 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05269 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11168 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25736 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47639 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47639
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-56gq-qmzj-1yaj |
|
| 24 |
| url |
VCID-5pt2-wwc2-zbfy |
| vulnerability_id |
VCID-5pt2-wwc2-zbfy |
| summary |
kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1016 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02384 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02543 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0249 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02445 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02451 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02556 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02454 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02466 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02467 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0247 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1016 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1016
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5pt2-wwc2-zbfy |
|
| 25 |
| url |
VCID-5rym-k4vn-nye8 |
| vulnerability_id |
VCID-5rym-k4vn-nye8 |
| summary |
kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1852 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04431 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04469 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04494 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04507 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04543 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04558 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04546 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04531 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04516 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04488 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04497 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04633 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04675 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1852 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1852
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5rym-k4vn-nye8 |
|
| 26 |
| url |
VCID-5vp9-ejh8-bbcr |
| vulnerability_id |
VCID-5vp9-ejh8-bbcr |
| summary |
kernel: ceph: fix inode reference leakage in ceph_get_snapdir() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49109 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01653 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01562 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01542 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01556 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16983 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17073 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1713 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49109 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49109
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5vp9-ejh8-bbcr |
|
| 27 |
| url |
VCID-5zzw-du1s-gyf2 |
| vulnerability_id |
VCID-5zzw-du1s-gyf2 |
| summary |
hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28903 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28611 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28872 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28827 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28778 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28797 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28774 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28725 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28953 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26373 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-26373
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5zzw-du1s-gyf2 |
|
| 28 |
| url |
VCID-62xu-hs8g-gyhq |
| vulnerability_id |
VCID-62xu-hs8g-gyhq |
| summary |
kernel: remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22068 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22082 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22041 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21979 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21974 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.2193 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21783 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22013 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49188 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49188
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-62xu-hs8g-gyhq |
|
| 29 |
| url |
VCID-6a92-c98x-uqfe |
| vulnerability_id |
VCID-6a92-c98x-uqfe |
| summary |
kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49534 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09262 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.2155 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24674 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24658 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24679 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24643 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24711 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24759 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24771 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24731 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49534 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49534
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6a92-c98x-uqfe |
|
| 30 |
| url |
VCID-6ca4-5f11-eqfv |
| vulnerability_id |
VCID-6ca4-5f11-eqfv |
| summary |
kernel: ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50115 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06033 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06078 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06101 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06132 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06127 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18874 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18963 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18976 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18981 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50115 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50115
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ca4-5f11-eqfv |
|
| 31 |
| url |
VCID-6fxv-3tch-23cq |
| vulnerability_id |
VCID-6fxv-3tch-23cq |
| summary |
kernel: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50027 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04784 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15157 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15058 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15119 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50027 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50027
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6fxv-3tch-23cq |
|
| 32 |
| url |
VCID-6pqs-2x2k-vyc5 |
| vulnerability_id |
VCID-6pqs-2x2k-vyc5 |
| summary |
kernel: tcp: add accessors to read/set tp->snd_cwnd |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49325 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06838 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06886 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14658 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14617 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14518 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14409 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14483 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14517 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14511 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.146 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49325 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49325
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6pqs-2x2k-vyc5 |
|
| 33 |
| url |
VCID-6pvh-2n4u-7yaw |
| vulnerability_id |
VCID-6pvh-2n4u-7yaw |
| summary |
kernel: dm ioctl: prevent potential spectre v1 gadget |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49122 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01669 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01568 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01556 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01571 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0166 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02166 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02167 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02168 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02189 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16755 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16814 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49122 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49122
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6pvh-2n4u-7yaw |
|
| 34 |
| url |
VCID-791q-n1py-47ah |
| vulnerability_id |
VCID-791q-n1py-47ah |
| summary |
kernel: powerpc/rtas: Keep MSR[RI] set when calling RTAS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49440 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08267 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31739 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31742 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31702 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31666 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31467 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31658 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.3171 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49440 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49440
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-791q-n1py-47ah |
|
| 35 |
| url |
VCID-7csu-6ca9-4ucq |
| vulnerability_id |
VCID-7csu-6ca9-4ucq |
| summary |
kernel: udmabuf: improper validation of array index leading to local privilege escalation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2008 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.7819 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.78239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.78244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.7826 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.78234 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.78229 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.7822 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0112 |
| scoring_system |
epss |
| scoring_elements |
0.78203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01547 |
| scoring_system |
epss |
| scoring_elements |
0.81461 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.01547 |
| scoring_system |
epss |
| scoring_elements |
0.81438 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01547 |
| scoring_system |
epss |
| scoring_elements |
0.8144 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2008 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2008
|
| risk_score |
3.7 |
| exploitability |
0.5 |
| weighted_severity |
7.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7csu-6ca9-4ucq |
|
| 36 |
| url |
VCID-7ds1-kkxr-b7gx |
| vulnerability_id |
VCID-7ds1-kkxr-b7gx |
| summary |
kernel: netfilter: nf_tables: possible module reference underflow in error path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04784 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15157 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15058 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15119 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50048 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50048
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7ds1-kkxr-b7gx |
|
| 37 |
| url |
VCID-7e2m-a86y-c3bd |
| vulnerability_id |
VCID-7e2m-a86y-c3bd |
| summary |
kernel: media: em28xx: initialize refcount before kref_get |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3239 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07549 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07568 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07554 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07542 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07455 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07588 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07466 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07505 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07487 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07546 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3239 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3239
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd |
|
| 38 |
| url |
VCID-7m61-6vud-xbhc |
| vulnerability_id |
VCID-7m61-6vud-xbhc |
| summary |
kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0315 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03083 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03054 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03172 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03175 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50536 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50536
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7m61-6vud-xbhc |
|
| 39 |
| url |
VCID-7nsd-5rzy-c7a2 |
| vulnerability_id |
VCID-7nsd-5rzy-c7a2 |
| summary |
kernel: ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14496 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14429 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24783 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24856 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24861 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24839 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24821 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24935 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2495 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49238 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49238
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7nsd-5rzy-c7a2 |
|
| 40 |
| url |
VCID-7qyk-a688-n3bx |
| vulnerability_id |
VCID-7qyk-a688-n3bx |
| summary |
kernel: veth: Ensure eth header is in skb's linear part |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49066 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15339 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.1527 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00735 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00692 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00733 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0075 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00922 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00925 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49066 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49066
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7qyk-a688-n3bx |
|
| 41 |
| url |
VCID-7s6p-4hc7-wkbc |
| vulnerability_id |
VCID-7s6p-4hc7-wkbc |
| summary |
kernel: exec: Force single empty string when argv is empty |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49264 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01236 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01162 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0115 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01232 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01179 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01166 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49264 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49264
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7s6p-4hc7-wkbc |
|
| 42 |
| url |
VCID-7xpp-ndqq-8be6 |
| vulnerability_id |
VCID-7xpp-ndqq-8be6 |
| summary |
kernel: media: usb: go7007: s2250-board: fix leak in probe() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01394 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09788 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13653 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13736 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13786 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13718 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13668 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13579 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13649 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49253 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49253
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7xpp-ndqq-8be6 |
|
| 43 |
| url |
VCID-834p-5e5a-zud6 |
| vulnerability_id |
VCID-834p-5e5a-zud6 |
| summary |
kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47378 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25098 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25178 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24931 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25103 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25117 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25077 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25022 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25031 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25023 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.24994 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.2522 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.2499 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00087 |
| scoring_system |
epss |
| scoring_elements |
0.25058 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47378 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47378
|
| risk_score |
3.9 |
| exploitability |
0.5 |
| weighted_severity |
7.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-834p-5e5a-zud6 |
|
| 44 |
| url |
VCID-8gr5-zvxj-mbb3 |
| vulnerability_id |
VCID-8gr5-zvxj-mbb3 |
| summary |
kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49288 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08241 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08186 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17103 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17163 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17312 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17326 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17277 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17218 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17162 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17198 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49288 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49288
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8gr5-zvxj-mbb3 |
|
| 45 |
| url |
VCID-8gx9-2a2j-tffv |
| vulnerability_id |
VCID-8gx9-2a2j-tffv |
| summary |
kernel: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06437 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19723 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19827 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50212 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50212
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8gx9-2a2j-tffv |
|
| 46 |
| url |
VCID-8m61-w5gs-gua7 |
| vulnerability_id |
VCID-8m61-w5gs-gua7 |
| summary |
kernel: mt76: mt7921: fix crash when startup fails. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49129 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22065 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22207 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.2229 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22344 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22365 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22323 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22264 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22269 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22263 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00074 |
| scoring_system |
epss |
| scoring_elements |
0.22215 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49129 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49129
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8m61-w5gs-gua7 |
|
| 47 |
| url |
VCID-8tv2-9rnq-dqf7 |
| vulnerability_id |
VCID-8tv2-9rnq-dqf7 |
| summary |
kernel: inet: fully convert sk->sk_rx_dst to RCU rules |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09489 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09428 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09338 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09445 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.09991 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10113 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10994 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11034 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47103 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47103
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv2-9rnq-dqf7 |
|
| 48 |
| url |
VCID-8zmf-w8w9-bydm |
| vulnerability_id |
VCID-8zmf-w8w9-bydm |
| summary |
kernel: posix-cpu-timers: Cleanup CPU timers before freeing them during exec |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50095 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06401 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0639 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06437 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19723 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19816 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19827 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50095 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50095
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8zmf-w8w9-bydm |
|
| 49 |
| url |
VCID-9133-4vru-fucq |
| vulnerability_id |
VCID-9133-4vru-fucq |
| summary |
kernel: possible to use the debugger to write zero into a location of choice |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21499 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39053 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.3936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39378 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39389 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.3935 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39331 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39384 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39355 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39268 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39367 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00178 |
| scoring_system |
epss |
| scoring_elements |
0.39391 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21499 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21499
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9133-4vru-fucq |
|
| 50 |
| url |
VCID-978p-j5hf-rqbq |
| vulnerability_id |
VCID-978p-j5hf-rqbq |
| summary |
kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08875 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08881 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08979 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08806 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0878 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08932 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08931 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08863 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0894 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08968 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08965 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.0893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08917 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47556 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47556
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-978p-j5hf-rqbq |
|
| 51 |
| url |
VCID-97ym-aqgz-ybbq |
| vulnerability_id |
VCID-97ym-aqgz-ybbq |
| summary |
kernel: dm mirror log: round up region bitmap size to BITS_PER_LONG |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49710 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.2842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.2838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28322 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28334 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28313 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28267 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28172 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28311 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28377 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49710 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49710
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-97ym-aqgz-ybbq |
|
| 52 |
| url |
VCID-9gux-pynq-nyhz |
| vulnerability_id |
VCID-9gux-pynq-nyhz |
| summary |
kernel: ext4: fix use-after-free in ext4_rename_dir_prepare |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49349 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0774 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07696 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.162 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16376 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16435 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16379 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16316 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16254 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16275 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1631 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49349 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49349
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9gux-pynq-nyhz |
|
| 53 |
| url |
VCID-9mpd-j8a4-dkau |
| vulnerability_id |
VCID-9mpd-j8a4-dkau |
| summary |
kernel: net: preserve skb_end_offset() in skb_unclone_keeptruesize() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49142 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21698 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21526 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21727 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49142 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49142
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9mpd-j8a4-dkau |
|
| 54 |
| url |
VCID-9nut-ha7g-dbbc |
| vulnerability_id |
VCID-9nut-ha7g-dbbc |
| summary |
kernel: scsi: qla2xxx: Fix scheduling while atomic |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49156 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.2842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.2838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28322 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28334 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28313 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28267 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28172 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28311 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28377 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49156 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49156
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9nut-ha7g-dbbc |
|
| 55 |
| url |
VCID-9ujy-9ynv-nkar |
| vulnerability_id |
VCID-9ujy-9ynv-nkar |
| summary |
kernel: netfilter: conntrack: re-fetch conntrack after insertion |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49561 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16483 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16444 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16323 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16344 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16379 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16273 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16439 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49561 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49561
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9ujy-9ynv-nkar |
|
| 56 |
| url |
VCID-a6c8-sxhf-auek |
| vulnerability_id |
VCID-a6c8-sxhf-auek |
| summary |
kernel: fanotify misuses fd_install() which could lead to use-after-free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1998 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31713 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31844 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31888 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31758 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31788 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31751 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31716 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31726 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31694 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31522 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1998 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1998
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6c8-sxhf-auek |
|
| 57 |
| url |
VCID-abus-pmpv-ayca |
| vulnerability_id |
VCID-abus-pmpv-ayca |
| summary |
kernel: iwlwifi: mvm: check debugfs_dir ptr before use |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48918 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07861 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.0791 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07899 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07797 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07952 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07909 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07862 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07921 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07941 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07929 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07913 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48918 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48918
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-abus-pmpv-ayca |
|
| 58 |
| url |
VCID-ac81-f1pp-3keh |
| vulnerability_id |
VCID-ac81-f1pp-3keh |
| summary |
kernel: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07129 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07204 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07183 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07237 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0726 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07247 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21171 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21324 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21332 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21307 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50030 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50030
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ac81-f1pp-3keh |
|
| 59 |
| url |
VCID-adpr-958r-eke7 |
| vulnerability_id |
VCID-adpr-958r-eke7 |
| summary |
kernel: race condition in snd_pcm_hw_free leading to use-after-free |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0281 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02718 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02715 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02696 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02706 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0282 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02719 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02741 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02744 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02764 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02735 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1048 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1048
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-adpr-958r-eke7 |
|
| 60 |
| url |
VCID-atz3-c1m5-eqa2 |
| vulnerability_id |
VCID-atz3-c1m5-eqa2 |
| summary |
kernel: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50092 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06259 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06321 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06353 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19468 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50092 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50092
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-atz3-c1m5-eqa2 |
|
| 61 |
| url |
VCID-b7qz-uybn-tkcf |
| vulnerability_id |
VCID-b7qz-uybn-tkcf |
| summary |
kernel: sched/fair: Fix fault in reweight_entity |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48921 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05742 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05954 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05805 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05768 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05775 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05921 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05783 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05778 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0582 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48921 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48921
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b7qz-uybn-tkcf |
|
| 62 |
| url |
VCID-bdpj-gk16-a3dz |
| vulnerability_id |
VCID-bdpj-gk16-a3dz |
| summary |
kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20368 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16153 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16204 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16223 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21147 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20941 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21003 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21019 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20974 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2092 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20942 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21093 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20368 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-20368
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdpj-gk16-a3dz |
|
| 63 |
| url |
VCID-bjfy-hvff-dqfy |
| vulnerability_id |
VCID-bjfy-hvff-dqfy |
| summary |
kernel: ibmvnic: free reset-work-item when flushing |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48905 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05869 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06085 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05972 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05953 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05944 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05935 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.059 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.0591 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06062 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05902 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05895 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05933 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48905 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48905
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bjfy-hvff-dqfy |
|
| 64 |
| url |
VCID-bp6k-v3c5-gudy |
| vulnerability_id |
VCID-bp6k-v3c5-gudy |
| summary |
kernel: LoadPin bypass via dm-verity table reload |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2503 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00202 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00194 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00197 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00193 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
4e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00195 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2503 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2503
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy |
|
| 65 |
| url |
VCID-byxa-eqjd-8yb2 |
| vulnerability_id |
VCID-byxa-eqjd-8yb2 |
| summary |
kernel: use after free in SUNRPC subsystem |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28893 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07986 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08033 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07992 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08053 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08077 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08029 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07932 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07918 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08075 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28893 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-28893
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-byxa-eqjd-8yb2 |
|
| 66 |
| url |
VCID-c1cc-6p4r-13d8 |
| vulnerability_id |
VCID-c1cc-6p4r-13d8 |
| summary |
kernel: cifs: fix handlecache and multiuser |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49281 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02111 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02049 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02062 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02145 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02099 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02117 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02094 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02079 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02074 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08267 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49281 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49281
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c1cc-6p4r-13d8 |
|
| 67 |
| url |
VCID-cdxu-3fm4-rkdr |
| vulnerability_id |
VCID-cdxu-3fm4-rkdr |
| summary |
kernel: mac80211: fix potential double free on mesh join |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49290 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03597 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03552 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03553 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03531 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03451 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03463 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07515 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07555 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49290 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49290
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cdxu-3fm4-rkdr |
|
| 68 |
| url |
VCID-ce4d-arhp-2fh7 |
| vulnerability_id |
VCID-ce4d-arhp-2fh7 |
| summary |
kernel: use-after-free vulnerability in function sco_sock_sendmsg() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3640 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01659 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01768 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01685 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01684 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01674 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01757 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01692 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01699 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01702 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01694 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3640 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3640
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ce4d-arhp-2fh7 |
|
| 69 |
| url |
VCID-cjvg-hahg-rygg |
| vulnerability_id |
VCID-cjvg-hahg-rygg |
| summary |
kernel: ext4: fix bug_on ext4_mb_use_inode_pa |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07121 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07103 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07023 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07156 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07039 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07094 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07124 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07113 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08625 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08676 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49708 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49708
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cjvg-hahg-rygg |
|
| 70 |
| url |
VCID-cr5s-una3-gyg4 |
| vulnerability_id |
VCID-cr5s-una3-gyg4 |
| summary |
kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03773 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03786 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03801 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03805 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03829 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03792 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03726 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03737 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0386 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03866 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24448 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24448
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cr5s-una3-gyg4 |
|
| 71 |
| url |
VCID-csy7-esn4-u3gq |
| vulnerability_id |
VCID-csy7-esn4-u3gq |
| summary |
x86: MMIO Stale Data vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21123 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63755 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63711 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63671 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63723 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.6374 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63754 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63706 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63741 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63751 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63739 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21123 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21123
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq |
|
| 72 |
| url |
VCID-cydx-ykad-7ke5 |
| vulnerability_id |
VCID-cydx-ykad-7ke5 |
| summary |
kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3108 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02109 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02113 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02127 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02104 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0245 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02542 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02555 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3108 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3108
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cydx-ykad-7ke5 |
|
| 73 |
| url |
VCID-d1uc-apk8-qked |
| vulnerability_id |
VCID-d1uc-apk8-qked |
| summary |
kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1280 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05438 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05245 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05247 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05714 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05747 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05773 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05751 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05743 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0564 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05674 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1280 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1280
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d1uc-apk8-qked |
|
| 74 |
| url |
VCID-d7ss-gn8d-93fj |
| vulnerability_id |
VCID-d7ss-gn8d-93fj |
| summary |
kernel: scsi: lpfc: Address NULL pointer dereference after starget_to_rport() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49332 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11394 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22845 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22866 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22772 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22787 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2278 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22739 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22578 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22718 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22793 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49332 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49332
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d7ss-gn8d-93fj |
|
| 75 |
| url |
VCID-dkbr-f7e9-qyfa |
| vulnerability_id |
VCID-dkbr-f7e9-qyfa |
| summary |
kernel: irqchip/gic-v3-its: Fix potential VPE leak on error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00597 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00619 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00591 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00584 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0058 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00581 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00576 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00621 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47373 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47373
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dkbr-f7e9-qyfa |
|
| 76 |
| url |
VCID-dqm4-h22h-fqdm |
| vulnerability_id |
VCID-dqm4-h22h-fqdm |
| summary |
kernel: ext4: fix bug_on in __es_tree_search |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49409 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08143 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08045 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0803 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08189 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08099 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08182 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08176 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08156 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08625 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08676 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49409 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49409
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dqm4-h22h-fqdm |
|
| 77 |
| url |
VCID-dxzp-2kau-bkfw |
| vulnerability_id |
VCID-dxzp-2kau-bkfw |
| summary |
kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10722 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10751 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10822 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10791 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10627 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10643 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10768 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49671 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49671
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dxzp-2kau-bkfw |
|
| 78 |
| url |
VCID-dzcg-vtsb-1kh6 |
| vulnerability_id |
VCID-dzcg-vtsb-1kh6 |
| summary |
kernel: dma-buf/dma-resv: Stop leaking on krealloc() failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53181 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01838 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.0184 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01843 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00012 |
| scoring_system |
epss |
| scoring_elements |
0.01857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02281 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02261 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02215 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02203 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02197 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-53181 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-53181
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dzcg-vtsb-1kh6 |
|
| 79 |
| url |
VCID-e7x1-pktx-dqc9 |
| vulnerability_id |
VCID-e7x1-pktx-dqc9 |
| summary |
kernel: wireguard: socket: free skb in send6 when ipv6 is disabled |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49153 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23837 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24014 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.2406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24077 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24034 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23978 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23988 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23976 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23959 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49153 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49153
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e7x1-pktx-dqc9 |
|
| 80 |
| url |
VCID-ec58-aejx-2kce |
| vulnerability_id |
VCID-ec58-aejx-2kce |
| summary |
kernel: mptcp: fix race on unaccepted mptcp sockets |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49669 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1212 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.33813 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34222 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34198 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34232 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34221 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.3419 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34233 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34262 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34263 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49669 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49669
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ec58-aejx-2kce |
|
| 81 |
| url |
VCID-ep2r-37u6-a7ht |
| vulnerability_id |
VCID-ep2r-37u6-a7ht |
| summary |
kernel: veth: ensure skb entering GRO are not cloned. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47099 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02056 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0215 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02109 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02105 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0208 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02094 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02129 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02147 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02124 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47099 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47099
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ep2r-37u6-a7ht |
|
| 82 |
| url |
VCID-er28-r5n3-eken |
| vulnerability_id |
VCID-er28-r5n3-eken |
| summary |
kernel: netfilter: fix use-after-free in __nf_register_net_hook() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48912 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06418 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0627 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06311 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06305 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.063 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06289 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06246 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06259 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06404 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06247 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06226 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48912 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48912
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-er28-r5n3-eken |
|
| 83 |
| url |
VCID-etaa-zh6y-kqg7 |
| vulnerability_id |
VCID-etaa-zh6y-kqg7 |
| summary |
kernel: dm raid: fix KASAN warning in raid5_add_disks |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08089 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11746 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15143 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15231 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15282 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15252 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15213 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15149 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15062 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15071 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15122 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49673 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49673
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-etaa-zh6y-kqg7 |
|
| 84 |
| url |
VCID-ewej-5s1a-bbek |
| vulnerability_id |
VCID-ewej-5s1a-bbek |
| summary |
kernel: sock: redo the psock vs ULP protection check |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49732 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02545 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02447 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02454 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02558 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02469 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02472 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02493 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02464 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49732 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49732
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ewej-5s1a-bbek |
|
| 85 |
| url |
VCID-eyf5-2y8d-33hp |
| vulnerability_id |
VCID-eyf5-2y8d-33hp |
| summary |
kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48765 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09471 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09615 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09524 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09569 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09519 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09507 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09568 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09539 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48765 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48765
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eyf5-2y8d-33hp |
|
| 86 |
| url |
VCID-f4jq-3ezz-63b6 |
| vulnerability_id |
VCID-f4jq-3ezz-63b6 |
| summary |
kernel: net: openvswitch: fix leak of nested actions |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01537 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01435 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01436 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01426 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0144 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01528 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15608 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18511 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18377 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18459 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49086 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49086
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f4jq-3ezz-63b6 |
|
| 87 |
| url |
VCID-f7p2-3cfh-3yh4 |
| vulnerability_id |
VCID-f7p2-3cfh-3yh4 |
| summary |
kernel: net: nexthop: fix null pointer dereference when IPv6 is not enabled |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47572 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09461 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09471 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09615 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09539 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09524 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09417 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09569 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09519 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09507 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09568 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47572 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47572
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f7p2-3cfh-3yh4 |
|
| 88 |
| url |
VCID-f9md-7hmr-qucr |
| vulnerability_id |
VCID-f9md-7hmr-qucr |
| summary |
kernel: smb2_ioctl_query_info NULL pointer dereference |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0168 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0439 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04631 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04493 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04475 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04445 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04454 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04591 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04468 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04517 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04507 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0168 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0168
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f9md-7hmr-qucr |
|
| 89 |
| url |
VCID-fa6b-jmqw-3bf3 |
| vulnerability_id |
VCID-fa6b-jmqw-3bf3 |
| summary |
kernel: ptp: unregister virtual clocks when unregistering physical clock. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29262 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29424 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29379 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29484 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29525 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29528 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29432 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29452 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34592 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49229
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fa6b-jmqw-3bf3 |
|
| 90 |
| url |
VCID-fh8d-gpu9-13ap |
| vulnerability_id |
VCID-fh8d-gpu9-13ap |
| summary |
kernel: block, bfq: don't move oom_bfqq |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49179 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15501 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15432 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16185 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16361 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16419 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16402 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16363 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.163 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16238 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16258 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16294 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49179 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49179
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fh8d-gpu9-13ap |
|
| 91 |
| url |
VCID-fkxh-mkuc-h7da |
| vulnerability_id |
VCID-fkxh-mkuc-h7da |
| summary |
kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08568 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08623 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08611 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08598 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08487 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08474 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08539 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08612 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08637 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08634 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48866 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48866
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fkxh-mkuc-h7da |
|
| 92 |
| url |
VCID-fndq-8n22-byes |
| vulnerability_id |
VCID-fndq-8n22-byes |
| summary |
kernel: nbd: fix io hung while disconnecting device |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49297 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01078 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01017 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01076 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01032 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01037 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0102 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01015 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01014 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08046 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08089 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49297 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49297
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fndq-8n22-byes |
|
| 93 |
| url |
VCID-fpkj-sk3m-pqae |
| vulnerability_id |
VCID-fpkj-sk3m-pqae |
| summary |
kernel: Drivers: hv: vmbus: Fix potential crash on module unload |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49098 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01127 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01133 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1645 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16388 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00898 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00954 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00897 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00905 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00957 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49098 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49098
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fpkj-sk3m-pqae |
|
| 94 |
| url |
VCID-fz24-3kux-sucr |
| vulnerability_id |
VCID-fz24-3kux-sucr |
| summary |
kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48738 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02463 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02551 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02475 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02478 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02477 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02468 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02452 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02459 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02565 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02476 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48738 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48738
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fz24-3kux-sucr |
|
| 95 |
| url |
VCID-g4vz-dgw6-dua2 |
| vulnerability_id |
VCID-g4vz-dgw6-dua2 |
| summary |
kernel: swiotlb information leak with DMA_FROM_DEVICE |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0854 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04576 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04637 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0466 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04673 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04707 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04719 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04679 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05116 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04929 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04939 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05086 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0854 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0854
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g4vz-dgw6-dua2 |
|
| 96 |
| url |
VCID-g8j3-3ky8-h7av |
| vulnerability_id |
VCID-g8j3-3ky8-h7av |
| summary |
kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2153 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03579 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03593 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06351 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06171 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06182 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06332 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06657 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06563 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06613 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06633 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06648 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06641 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2153 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2153
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g8j3-3ky8-h7av |
|
| 97 |
| url |
VCID-gcuq-w2hp-xubb |
| vulnerability_id |
VCID-gcuq-w2hp-xubb |
| summary |
kernel: ath9k_htc: fix uninit value bugs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05785 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05744 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07455 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0741 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07488 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07481 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07469 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07457 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07381 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07367 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07495 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49235 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49235
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gcuq-w2hp-xubb |
|
| 98 |
| url |
VCID-ge37-2by5-yudu |
| vulnerability_id |
VCID-ge37-2by5-yudu |
| summary |
kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1679 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13928 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14011 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14065 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13953 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13962 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13876 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13783 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13778 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13853 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13878 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1679 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1679
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ge37-2by5-yudu |
|
| 99 |
| url |
VCID-gvxp-zyrr-s7em |
| vulnerability_id |
VCID-gvxp-zyrr-s7em |
| summary |
kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49060 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02235 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02182 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02178 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02156 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02168 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02253 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.2406 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23947 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24014 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49060 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49060
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gvxp-zyrr-s7em |
|
| 100 |
| url |
VCID-gx5c-b8jv-nqae |
| vulnerability_id |
VCID-gx5c-b8jv-nqae |
| summary |
kernel: NFSv4: Fix free of uninitialized nfs4_label on referral lookup. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49418 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11394 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19023 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1903 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18983 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18932 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18899 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18911 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.188 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1889 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.18969 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49418 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49418
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gx5c-b8jv-nqae |
|
| 101 |
| url |
VCID-h2wd-jwjk-quhr |
| vulnerability_id |
VCID-h2wd-jwjk-quhr |
| summary |
kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49199 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21698 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21526 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21727 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49199 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49199
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h2wd-jwjk-quhr |
|
| 102 |
| url |
VCID-h4y4-y8zk-s3aw |
| vulnerability_id |
VCID-h4y4-y8zk-s3aw |
| summary |
kernel: ALSA: hda: Fix UAF of leds class devs at unbinding |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48735 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04859 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05036 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0492 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04901 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04858 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.05006 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04886 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04904 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0494 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04957 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48735 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48735
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h4y4-y8zk-s3aw |
|
| 103 |
| url |
VCID-h5cf-6zve-kudd |
| vulnerability_id |
VCID-h5cf-6zve-kudd |
| summary |
kernel: ip_gre: test csum_start instead of transport header |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49340 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28585 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28541 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28507 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28485 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28438 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28322 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28477 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28543 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49340 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49340
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h5cf-6zve-kudd |
|
| 104 |
| url |
VCID-h5yv-de9v-r3hh |
| vulnerability_id |
VCID-h5yv-de9v-r3hh |
| summary |
kernel: wifi: rtw89: 8852a: rfk: fix div 0 exception |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04784 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15157 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15058 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15119 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50178
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h5yv-de9v-r3hh |
|
| 105 |
| url |
VCID-h8qz-fp8v-1uge |
| vulnerability_id |
VCID-h8qz-fp8v-1uge |
| summary |
kernel: XArray: Fix xas_create_range() when multi-order entry present |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49152 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06595 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06559 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32037 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32002 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31969 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31979 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31952 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31783 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.31957 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00127 |
| scoring_system |
epss |
| scoring_elements |
0.32008 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49152 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49152
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h8qz-fp8v-1uge |
|
| 106 |
| url |
VCID-hhf3-eu8v-9fds |
| vulnerability_id |
VCID-hhf3-eu8v-9fds |
| summary |
kernel: dm raid: fix address sanitizer warning in raid_status |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50084 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04672 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04708 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04724 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04757 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04769 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0476 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15095 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14995 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15005 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15056 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50084 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50084
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hhf3-eu8v-9fds |
|
| 107 |
| url |
VCID-hnr4-z1a1-1bdu |
| vulnerability_id |
VCID-hnr4-z1a1-1bdu |
| summary |
kernel: netfilter: use get_random_u32 instead of prandom |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49698 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30144 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30147 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30105 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30056 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30046 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30001 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.29929 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30049 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30109 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49698 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49698
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hnr4-z1a1-1bdu |
|
| 108 |
| url |
VCID-hnyy-rfkm-abec |
| vulnerability_id |
VCID-hnyy-rfkm-abec |
| summary |
kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05692 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05657 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06838 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06852 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06907 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06938 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06935 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06923 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0676 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0617 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0617
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hnyy-rfkm-abec |
|
| 109 |
| url |
VCID-hrfh-56vj-jufm |
| vulnerability_id |
VCID-hrfh-56vj-jufm |
| summary |
kernel: usb: usbip: fix a refcount leak in stub_probe() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49389 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09788 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13786 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13755 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13718 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13668 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13579 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13649 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1366 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13653 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13736 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49389 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49389
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrfh-56vj-jufm |
|
| 110 |
| url |
VCID-j157-dgq1-yfat |
| vulnerability_id |
VCID-j157-dgq1-yfat |
| summary |
kernel: bfq: Make sure bfqg for which we are queueing requests is online |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49411 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.23978 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24096 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24162 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24207 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24224 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24182 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24125 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.2414 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24127 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00082 |
| scoring_system |
epss |
| scoring_elements |
0.24103 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49411 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49411
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j157-dgq1-yfat |
|
| 111 |
| url |
VCID-j9e3-n3tr-hyht |
| vulnerability_id |
VCID-j9e3-n3tr-hyht |
| summary |
kernel: blk-iolatency: Fix inflight count imbalances and IO hangs on offline |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16387 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1637 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16239 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16324 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18294 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18357 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18395 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49394 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49394
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j9e3-n3tr-hyht |
|
| 112 |
| url |
VCID-j9ry-7pb3-27ff |
| vulnerability_id |
VCID-j9ry-7pb3-27ff |
| summary |
kernel: ALSA: jack: Access input_dev under mutex |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49538 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12526 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12478 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12607 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12534 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12398 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12403 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00041 |
| scoring_system |
epss |
| scoring_elements |
0.12518 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49538 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49538
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ry-7pb3-27ff |
|
| 113 |
| url |
VCID-jar8-nqnp-pqbw |
| vulnerability_id |
VCID-jar8-nqnp-pqbw |
| summary |
kernel: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11716 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11679 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11653 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1151 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11514 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11637 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11594 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11564 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49559 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49559
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jar8-nqnp-pqbw |
|
| 114 |
| url |
VCID-jdjk-pv6p-skct |
| vulnerability_id |
VCID-jdjk-pv6p-skct |
| summary |
kernel: scsi: qla2xxx: Fix crash during module load unload test |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49160 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23775 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23731 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23675 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23656 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23544 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23713 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49160 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49160
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjk-pv6p-skct |
|
| 115 |
| url |
VCID-jptx-14zk-5bat |
| vulnerability_id |
VCID-jptx-14zk-5bat |
| summary |
kernel: kernel info leak issue in pfkey_register |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1353 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02392 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0241 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04493 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04513 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04484 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04427 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04466 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04491 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0454 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04528 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1353 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1353
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jptx-14zk-5bat |
|
| 116 |
| url |
VCID-jv67-34h2-wbfj |
| vulnerability_id |
VCID-jv67-34h2-wbfj |
| summary |
kernel: ext4: fix bug_on in ext4_writepages |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49347 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06208 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08422 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08413 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08378 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08271 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08253 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08414 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08384 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08334 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08405 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49347 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49347
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jv67-34h2-wbfj |
|
| 117 |
| url |
VCID-jypn-zeph-bbha |
| vulnerability_id |
VCID-jypn-zeph-bbha |
| summary |
kernel: sfc: fix kernel panic when creating VF |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07592 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07504 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08823 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10047 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10007 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0986 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09982 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.10031 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49625 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49625
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jypn-zeph-bbha |
|
| 118 |
| url |
VCID-k3ex-xfx7-k7a5 |
| vulnerability_id |
VCID-k3ex-xfx7-k7a5 |
| summary |
kernel: arch/arm64: Fix topology initialization for core scheduling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08344 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08346 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08226 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08213 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08374 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17105 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23713 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49090 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49090
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ex-xfx7-k7a5 |
|
| 119 |
| url |
VCID-k883-unu8-1fhx |
| vulnerability_id |
VCID-k883-unu8-1fhx |
| summary |
kernel: block: don't delete queue kobject before its children |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01352 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01256 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01269 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01344 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01276 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01281 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01285 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01267 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01262 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01265 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16388 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1645 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49259 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49259
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k883-unu8-1fhx |
|
| 120 |
| url |
VCID-kp8q-4wu1-xkbs |
| vulnerability_id |
VCID-kp8q-4wu1-xkbs |
| summary |
kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.1455 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31467 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31739 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31742 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31702 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31666 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.31658 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00125 |
| scoring_system |
epss |
| scoring_elements |
0.3171 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49615 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49615
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kp8q-4wu1-xkbs |
|
| 121 |
| url |
VCID-ksaf-6va1-a3cd |
| vulnerability_id |
VCID-ksaf-6va1-a3cd |
| summary |
kernel: xsk: Fix race at socket teardown |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49215 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.07965 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00028 |
| scoring_system |
epss |
| scoring_elements |
0.08011 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15457 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15379 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15314 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15231 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15236 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15287 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15327 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15318 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15406 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49215 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49215
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksaf-6va1-a3cd |
|
| 122 |
| url |
VCID-ksbt-eq7q-y3d8 |
| vulnerability_id |
VCID-ksbt-eq7q-y3d8 |
| summary |
hw: Intel: Improper restriction in memory buffer in graphics drivers cause escalation of privilege |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28410 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23704 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23357 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23561 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23574 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23563 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23542 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23747 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23527 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23599 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23644 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2366 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28410 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28410
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksbt-eq7q-y3d8 |
|
| 123 |
| url |
VCID-kw9v-ery2-sffr |
| vulnerability_id |
VCID-kw9v-ery2-sffr |
| summary |
Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29901 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22224 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22272 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22055 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22136 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.2219 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22211 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22171 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22111 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.2211 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22104 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22058 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.21918 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29901 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29901
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr |
|
| 124 |
| url |
VCID-m1yb-dke2-xkb4 |
| vulnerability_id |
VCID-m1yb-dke2-xkb4 |
| summary |
kernel: RDMA/hfi1: Prevent use of lock before it is initialized |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49433 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14406 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18377 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18459 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18511 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18512 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18464 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18357 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18395 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49433 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49433
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m1yb-dke2-xkb4 |
|
| 125 |
| url |
VCID-m5ak-dw88-t3hk |
| vulnerability_id |
VCID-m5ak-dw88-t3hk |
| summary |
kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00928 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00929 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00932 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00916 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00917 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00914 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00972 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00974 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4387 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4387
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m5ak-dw88-t3hk |
|
| 126 |
| url |
VCID-m7kz-3jyd-3fak |
| vulnerability_id |
VCID-m7kz-3jyd-3fak |
| summary |
kernel: block: Fix the maximum minor value is blk_alloc_ext_minor() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49147 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21795 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21755 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21698 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21705 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21674 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21526 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21727 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49147 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49147
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m7kz-3jyd-3fak |
|
| 127 |
| url |
VCID-mh44-msu4-3qbv |
| vulnerability_id |
VCID-mh44-msu4-3qbv |
| summary |
kernel: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49291 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02317 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02264 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02286 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02268 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02256 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02254 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02236 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02246 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0234 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08241 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08186 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17163 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49291 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49291
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mh44-msu4-3qbv |
|
| 128 |
| url |
VCID-nssg-bpjj-d3be |
| vulnerability_id |
VCID-nssg-bpjj-d3be |
| summary |
kernel: KVM: x86/mmu: make apf token non-zero to fix bug |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48943 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0739 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07464 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07478 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07466 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07376 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07505 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07434 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07416 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07472 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07496 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48943 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48943
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nssg-bpjj-d3be |
|
| 129 |
| url |
VCID-p1h2-jzsz-7fau |
| vulnerability_id |
VCID-p1h2-jzsz-7fau |
| summary |
kernel: scsi: lpfc: Fix call trace observed during I/O with CMF enabled |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08267 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08319 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22679 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22656 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.226 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22615 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22612 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22561 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22409 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.2255 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22627 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49537 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49537
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p1h2-jzsz-7fau |
|
| 130 |
| url |
VCID-pdxe-wqnn-s3gb |
| vulnerability_id |
VCID-pdxe-wqnn-s3gb |
| summary |
kernel: ALSA: usb-audio: Cancel pending work at closing a MIDI substream |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2589 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25756 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25827 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25777 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25749 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25791 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25794 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28172 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49545 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49545
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pdxe-wqnn-s3gb |
|
| 131 |
| url |
VCID-pv2y-hzvr-hyad |
| vulnerability_id |
VCID-pv2y-hzvr-hyad |
| summary |
kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28390 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03085 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02991 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02982 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02959 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02969 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03089 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03021 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03028 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03052 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03015 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28390 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-28390
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pv2y-hzvr-hyad |
|
| 132 |
| url |
VCID-pztf-yx5c-y7a2 |
| vulnerability_id |
VCID-pztf-yx5c-y7a2 |
| summary |
kernel: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49247 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01177 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01176 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01162 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01155 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01159 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01147 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0117 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00902 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00904 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49247 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49247
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pztf-yx5c-y7a2 |
|
| 133 |
| url |
VCID-q43k-2kyw-1kbu |
| vulnerability_id |
VCID-q43k-2kyw-1kbu |
| summary |
kernel: blk-throttle: Set BIO_THROTTLED when bio has been throttled |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49465 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16515 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16453 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30499 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30699 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30756 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30788 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30747 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30701 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30725 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30706 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30671 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49465 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49465
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q43k-2kyw-1kbu |
|
| 134 |
| url |
VCID-q55w-hud9-9ydw |
| vulnerability_id |
VCID-q55w-hud9-9ydw |
| summary |
kernel: ptp: Fix possible memory leak in ptp_clock_register() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47455 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04822 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04999 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04883 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04864 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04813 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04966 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04866 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04903 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.0492 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47455 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47455
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q55w-hud9-9ydw |
|
| 135 |
| url |
VCID-q5kt-n8qx-57dd |
| vulnerability_id |
VCID-q5kt-n8qx-57dd |
| summary |
kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1095 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03721 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03799 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03711 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03685 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03661 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03673 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03794 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03732 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03746 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0375 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03774 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03733 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-1095 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-1095
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q5kt-n8qx-57dd |
|
| 136 |
| url |
VCID-qhc3-ffew-q7at |
| vulnerability_id |
VCID-qhc3-ffew-q7at |
| summary |
kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06014 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0605 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16069 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18085 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18234 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18288 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18291 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18193 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18137 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18149 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18175 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49536 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49536
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qhc3-ffew-q7at |
|
| 137 |
| url |
VCID-qmdw-hcza-cycq |
| vulnerability_id |
VCID-qmdw-hcza-cycq |
| summary |
kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1184 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0628 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06346 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06374 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06416 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06409 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06332 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06343 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0649 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06503 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1184 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1184
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qmdw-hcza-cycq |
|
| 138 |
| url |
VCID-r48g-c56n-sqdz |
| vulnerability_id |
VCID-r48g-c56n-sqdz |
| summary |
hw: cpu: Intel: information disclosure via local access |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28693 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13913 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13777 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13688 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13683 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13755 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1397 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13856 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13864 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13828 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1378 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-28693 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-28693
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r48g-c56n-sqdz |
|
| 139 |
| url |
VCID-rcv2-9tnc-dqbp |
| vulnerability_id |
VCID-rcv2-9tnc-dqbp |
| summary |
kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47657 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10646 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16872 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17058 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16996 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16933 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16934 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.1697 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21727 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23775 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47657 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47657
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rcv2-9tnc-dqbp |
|
| 140 |
| url |
VCID-rg5z-v1z7-9ygz |
| vulnerability_id |
VCID-rg5z-v1z7-9ygz |
| summary |
kernel: erspan: do not assume transport header is always set |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16387 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1637 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16199 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16256 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16147 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16239 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16324 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49691
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rg5z-v1z7-9ygz |
|
| 141 |
| url |
VCID-rj99-p8mt-pqg9 |
| vulnerability_id |
VCID-rj99-p8mt-pqg9 |
| summary |
kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50000 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04693 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04734 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04751 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04784 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04796 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04788 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15157 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15058 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15068 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15119 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50000 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50000
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rj99-p8mt-pqg9 |
|
| 142 |
| url |
VCID-rw9z-gey2-u7bh |
| vulnerability_id |
VCID-rw9z-gey2-u7bh |
| summary |
kernel: igb: fix a use-after-free issue in igb_clean_tx_ring |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49695 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25599 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25736 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25784 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25794 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25753 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25695 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25696 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25679 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25655 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49695 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49695
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rw9z-gey2-u7bh |
|
| 143 |
| url |
VCID-rynn-q2u9-v7h1 |
| vulnerability_id |
VCID-rynn-q2u9-v7h1 |
| summary |
kernel: vsock: remove vsock from connected table when connect is interrupted by a signal |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48786 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00743 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0077 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0074 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00744 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00736 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00732 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00726 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0073 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00771 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-48786 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-48786
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rynn-q2u9-v7h1 |
|
| 144 |
| url |
VCID-s3jv-85uw-hugd |
| vulnerability_id |
VCID-s3jv-85uw-hugd |
| summary |
kernel: netfilter: nfnetlink_osf: uninitialized variable information disclosure vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22174 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23948 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23881 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23994 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24011 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23967 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26145 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26279 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.26254 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00094 |
| scoring_system |
epss |
| scoring_elements |
0.2622 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42432 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42432
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s3jv-85uw-hugd |
|
| 145 |
| url |
VCID-s58d-5gm5-43ck |
| vulnerability_id |
VCID-s58d-5gm5-43ck |
| summary |
kernel: sfc: fix considering that all channels have TX queues |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49378 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20272 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20251 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20192 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20184 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20188 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20187 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20065 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20132 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20213 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49378 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49378
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s58d-5gm5-43ck |
|
| 146 |
| url |
VCID-sbya-z3j7-jbh3 |
| vulnerability_id |
VCID-sbya-z3j7-jbh3 |
| summary |
kernel: udmabuf: validate ubuf->pagecount |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47649 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01118 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01112 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01114 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10303 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13568 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13437 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13519 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00897 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00905 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00954 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
9e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00957 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47649 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47649
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sbya-z3j7-jbh3 |
|
| 147 |
| url |
VCID-sc7v-2hz2-cfde |
| vulnerability_id |
VCID-sc7v-2hz2-cfde |
| summary |
kernel: ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49268 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04924 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04736 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04746 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0489 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04792 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04836 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04803 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04783 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49268 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49268
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sc7v-2hz2-cfde |
|
| 148 |
| url |
VCID-szgy-w5mr-gqcz |
| vulnerability_id |
VCID-szgy-w5mr-gqcz |
| summary |
kernel: bfq: Update cgroup information before merging bio |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49413 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20217 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20369 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20427 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20456 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20411 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20346 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20343 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49413 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49413
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-szgy-w5mr-gqcz |
|
| 149 |
| url |
VCID-szsu-zzs2-k7a2 |
| vulnerability_id |
VCID-szsu-zzs2-k7a2 |
| summary |
kernel: ath11k: Fix frames flush failure caused by deadlock |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49123 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06873 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10994 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.11138 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.1098 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11486 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17386 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20538 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.2048 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20399 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
8e-05 |
| scoring_system |
epss |
| scoring_elements |
0.0073 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49123 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49123
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-szsu-zzs2-k7a2 |
|
| 150 |
| url |
VCID-t5af-qk3e-qyfa |
| vulnerability_id |
VCID-t5af-qk3e-qyfa |
| summary |
kernel: off-path attacker may inject data or terminate victim's TCP session |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-36516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11899 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11814 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11929 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12015 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12074 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.1197 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.11932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12084 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-36516 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-36516
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t5af-qk3e-qyfa |
|
| 151 |
|
| 152 |
| url |
VCID-t9n3-kkm8-vue2 |
| vulnerability_id |
VCID-t9n3-kkm8-vue2 |
| summary |
kernel: scsi: lpfc: Inhibit aborts if external loopback plug is inserted |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09262 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.2181 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.2182 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21781 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21724 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21697 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.2155 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21752 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49504
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9n3-kkm8-vue2 |
|
| 153 |
| url |
VCID-tbqr-e1t1-23cb |
| vulnerability_id |
VCID-tbqr-e1t1-23cb |
| summary |
kernel: x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49557 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.2376 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23775 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23731 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23675 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23687 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23677 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23656 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23544 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23713 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49557 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49557
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbqr-e1t1-23cb |
|
| 154 |
| url |
VCID-td6e-x2qb-syg3 |
| vulnerability_id |
VCID-td6e-x2qb-syg3 |
| summary |
x86: MMIO Stale Data vulnerabilities |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47421 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47466 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47443 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47446 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47441 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00242 |
| scoring_system |
epss |
| scoring_elements |
0.47391 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00536 |
| scoring_system |
epss |
| scoring_elements |
0.67507 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00536 |
| scoring_system |
epss |
| scoring_elements |
0.67499 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00536 |
| scoring_system |
epss |
| scoring_elements |
0.67511 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00536 |
| scoring_system |
epss |
| scoring_elements |
0.67488 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21125 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21125
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3 |
|
| 155 |
| url |
VCID-uf8f-sp1n-dfdf |
| vulnerability_id |
VCID-uf8f-sp1n-dfdf |
| summary |
kernel: ext4: fix memory leak in parse_apply_sb_mount_options() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49408 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17354 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17305 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32719 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32948 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.3291 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32924 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32903 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32867 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32916 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49408 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49408
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uf8f-sp1n-dfdf |
|
| 156 |
| url |
VCID-ugae-c268-37de |
| vulnerability_id |
VCID-ugae-c268-37de |
| summary |
kernel: ALSA: oss: Fix PCM OSS buffer allocation overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49292 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02594 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02498 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02503 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02609 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02519 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02523 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02524 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02513 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02512 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08186 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08241 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49292 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49292
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ugae-c268-37de |
|
| 157 |
| url |
VCID-uste-4tg4-tbg2 |
| vulnerability_id |
VCID-uste-4tg4-tbg2 |
| summary |
kernel: PM: core: keep irq flags in device_pm_check_callbacks() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49175 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01236 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01162 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0115 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01232 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01179 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.0118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01166 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0001 |
| scoring_system |
epss |
| scoring_elements |
0.01158 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16502 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16563 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49175 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49175
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uste-4tg4-tbg2 |
|
| 158 |
| url |
VCID-uvqn-vktu-fkdt |
| vulnerability_id |
VCID-uvqn-vktu-fkdt |
| summary |
kernel: tipc: check attribute length for bearer name |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49374 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18294 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18377 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18459 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18511 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18512 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18464 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18357 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18395 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49374 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49374
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uvqn-vktu-fkdt |
|
| 159 |
| url |
VCID-v7ex-q9pm-7kf3 |
| vulnerability_id |
VCID-v7ex-q9pm-7kf3 |
| summary |
kernel: netfilter: nft_tproxy: restrict to prerouting hook |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06259 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06275 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06321 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06353 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06298 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19468 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1956 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50001 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50001
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ex-q9pm-7kf3 |
|
| 160 |
| url |
VCID-vqbz-4mev-mkhf |
| vulnerability_id |
VCID-vqbz-4mev-mkhf |
| summary |
kernel: tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49330 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16509 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16492 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16453 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16332 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16353 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16388 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16282 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16449 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49330 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49330
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vqbz-4mev-mkhf |
|
| 161 |
| url |
VCID-vrqx-rx44-97br |
| vulnerability_id |
VCID-vrqx-rx44-97br |
| summary |
kernel: block: null_blk: end timed out poll request |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49057 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11394 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1169 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11744 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11608 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11606 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11729 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16098 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16161 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16011 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49057 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49057
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vrqx-rx44-97br |
|
| 162 |
| url |
VCID-vt3m-r6xs-6yhn |
| vulnerability_id |
VCID-vt3m-r6xs-6yhn |
| summary |
kernel: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50179 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06416 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06508 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06505 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06488 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19918 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50179 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50179
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3m-r6xs-6yhn |
|
| 163 |
| url |
VCID-w6az-58av-47a8 |
| vulnerability_id |
VCID-w6az-58av-47a8 |
| summary |
kernel: drbd: only clone bio if we have a backing device |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50506 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0477 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04875 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04912 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50506 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50506
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w6az-58av-47a8 |
|
| 164 |
| url |
VCID-wdrm-2ct7-7bg5 |
| vulnerability_id |
VCID-wdrm-2ct7-7bg5 |
| summary |
kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3107 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02109 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02113 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02127 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02104 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02084 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0245 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02542 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02555 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3107 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3107
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wdrm-2ct7-7bg5 |
|
| 165 |
| url |
VCID-weps-sam3-6yhn |
| vulnerability_id |
VCID-weps-sam3-6yhn |
| summary |
kernel: bpf: Fix a btf decl_tag bug when tagging a function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06486 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06311 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06323 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06472 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06308 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06355 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06395 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06388 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06383 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06372 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49228 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49228
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-weps-sam3-6yhn |
|
| 166 |
| url |
VCID-wgzq-sfgs-tuae |
| vulnerability_id |
VCID-wgzq-sfgs-tuae |
| summary |
kernel: ath11k: fix netdev open race |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50187 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04663 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04676 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0471 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04723 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04716 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04699 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04682 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14986 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14886 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14948 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50187 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50187
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wgzq-sfgs-tuae |
|
| 167 |
| url |
VCID-wjwn-fu3r-nqf5 |
| vulnerability_id |
VCID-wjwn-fu3r-nqf5 |
| summary |
kernel: skbuff: fix coalescing for page_pool fragment recycling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49093 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13854 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13911 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.29929 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30049 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30109 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30144 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30147 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30105 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30056 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30046 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30001 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49093 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49093
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wjwn-fu3r-nqf5 |
|
| 168 |
| url |
VCID-wmj2-k6ca-yyet |
| vulnerability_id |
VCID-wmj2-k6ca-yyet |
| summary |
kernel: ath11k: mhi: use mhi_sync_power_up() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49130 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.22943 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23148 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23164 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23156 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23118 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25756 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25827 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28424 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49130 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49130
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wmj2-k6ca-yyet |
|
| 169 |
| url |
VCID-wtjw-5xm7-5ug6 |
| vulnerability_id |
VCID-wtjw-5xm7-5ug6 |
| summary |
kernel: loop: implement ->free_disk |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49531 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06873 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.0683 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17161 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17278 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17217 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17223 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17256 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17221 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17314 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17386 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49531 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49531
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wtjw-5xm7-5ug6 |
|
| 170 |
| url |
VCID-x6g1-brzn-wkfy |
| vulnerability_id |
VCID-x6g1-brzn-wkfy |
| summary |
kernel: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49107 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03981 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03901 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03882 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03857 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03836 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03845 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03965 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23096 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2317 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23221 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49107 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49107
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x6g1-brzn-wkfy |
|
| 171 |
| url |
VCID-xbaa-2t96-w3dp |
| vulnerability_id |
VCID-xbaa-2t96-w3dp |
| summary |
kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49584 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07626 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19758 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19762 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19713 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19656 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19632 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19634 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19648 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19539 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19627 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19707 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49584 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49584
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xbaa-2t96-w3dp |
|
| 172 |
| url |
VCID-xt2w-myh3-s7eu |
| vulnerability_id |
VCID-xt2w-myh3-s7eu |
| summary |
kernel: ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49515 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08793 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00031 |
| scoring_system |
epss |
| scoring_elements |
0.08842 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33892 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33891 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33849 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33847 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33816 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33454 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33818 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.3386 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49515 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49515
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xt2w-myh3-s7eu |
|
| 173 |
| url |
VCID-xv1q-1ump-cfgv |
| vulnerability_id |
VCID-xv1q-1ump-cfgv |
| summary |
kernel: bpf: Fix request_sock leak in sk lookup helpers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49697 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33316 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33319 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33278 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33255 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33294 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33271 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33235 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33086 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33281 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49697 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49697
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xv1q-1ump-cfgv |
|
| 174 |
| url |
VCID-yec9-84hq-h3a9 |
| vulnerability_id |
VCID-yec9-84hq-h3a9 |
| summary |
kernel: scsi: qla2xxx: Fix warning message due to adisc being flushed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06838 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06886 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17926 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17942 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17898 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17849 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17791 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17801 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17838 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17746 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17778 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17866 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49158 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49158
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yec9-84hq-h3a9 |
|
| 175 |
| url |
VCID-yemh-xwuf-myaq |
| vulnerability_id |
VCID-yemh-xwuf-myaq |
| summary |
kernel: netfilter: nf_tables: do not allow SET_ID to refer to another table |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50213 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06416 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06466 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06508 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06505 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06488 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19811 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19918 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-50213 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-50213
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yemh-xwuf-myaq |
|
| 176 |
| url |
VCID-ymdz-x8ab-kuat |
| vulnerability_id |
VCID-ymdz-x8ab-kuat |
| summary |
kernel: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49543 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11596 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26122 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26132 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26086 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26027 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26031 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26008 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25974 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25913 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26004 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.2607 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49543 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49543
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ymdz-x8ab-kuat |
|
| 177 |
| url |
VCID-yqat-sxev-bfdt |
| vulnerability_id |
VCID-yqat-sxev-bfdt |
| summary |
kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20572 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0232 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02389 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02402 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02397 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02422 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02404 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02393 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02377 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02399 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0287 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02762 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.02874 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-20572 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-20572
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yqat-sxev-bfdt |
|
| 178 |
| url |
VCID-yst1-cukd-a3e5 |
| vulnerability_id |
VCID-yst1-cukd-a3e5 |
| summary |
kernel: Revert "Revert "block, bfq: honor already-setup queue merges"" |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47646 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02519 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02523 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03407 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03688 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03662 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03294 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03305 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03421 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15432 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15391 |
| published_at |
2026-04-01T12:55:00Z |
|
| 12 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15501 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-47646 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-47646
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yst1-cukd-a3e5 |
|
| 179 |
| url |
VCID-yv2c-29cg-e3cp |
| vulnerability_id |
VCID-yv2c-29cg-e3cp |
| summary |
kernel: RDMA/irdma: Fix sleep from invalid context BUG |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49606 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06039 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06073 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29559 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29561 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29516 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29464 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29483 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29455 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29409 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29293 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29519 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49606 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49606
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yv2c-29cg-e3cp |
|
| 180 |
| url |
VCID-yvf9-x49e-vba9 |
| vulnerability_id |
VCID-yvf9-x49e-vba9 |
| summary |
kernel: sfc: fix use after free when disabling sriov |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49626 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03567 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03559 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18286 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18393 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18441 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18388 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18305 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18298 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49626 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49626
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yvf9-x49e-vba9 |
|
| 181 |
| url |
VCID-ywx7-11kj-vkaj |
| vulnerability_id |
VCID-ywx7-11kj-vkaj |
| summary |
kernel: mm/huge_memory: Fix xarray node memory leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49334 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08382 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34664 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34666 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34627 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34603 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34642 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34628 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34589 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34353 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34592 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00143 |
| scoring_system |
epss |
| scoring_elements |
0.34635 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49334 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49334
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ywx7-11kj-vkaj |
|
| 182 |
| url |
VCID-z2wn-6gpb-6bcu |
| vulnerability_id |
VCID-z2wn-6gpb-6bcu |
| summary |
kernel: dm: fix use-after-free in dm_cleanup_zoned_dev() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35057 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.353 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35346 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35372 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35373 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35315 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35354 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35342 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.3529 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49270 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49270
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z2wn-6gpb-6bcu |
|
| 183 |
| url |
VCID-z4we-1au6-gqh4 |
| vulnerability_id |
VCID-z4we-1au6-gqh4 |
| summary |
kernel: ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49272 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07706 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07663 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09411 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09394 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.0938 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09271 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09421 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09476 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00032 |
| scoring_system |
epss |
| scoring_elements |
0.09364 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49272 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49272
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z4we-1au6-gqh4 |
|
| 184 |
| url |
VCID-zasw-wwu3-xkaf |
| vulnerability_id |
VCID-zasw-wwu3-xkaf |
| summary |
kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84427 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84534 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84447 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84469 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84475 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84493 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84488 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84483 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84505 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.02217 |
| scoring_system |
epss |
| scoring_elements |
0.84507 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2586 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2586
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zasw-wwu3-xkaf |
|
| 185 |
| url |
VCID-zb92-vd24-8yhk |
| vulnerability_id |
VCID-zb92-vd24-8yhk |
| summary |
kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20916 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21067 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2112 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20835 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20915 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20976 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20993 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.2095 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20887 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20888 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20868 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20739 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1263 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1263
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zb92-vd24-8yhk |
|
| 186 |
| url |
VCID-zbse-sx7a-93ek |
| vulnerability_id |
VCID-zbse-sx7a-93ek |
| summary |
kernel: firmware: arm_scmi: Fix list protocols enumeration in the base protocol |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04951 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04823 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04855 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04832 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04812 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.0476 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04769 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04915 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49451 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49451
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zbse-sx7a-93ek |
|
| 187 |
| url |
VCID-zkyv-h5at-xkgq |
| vulnerability_id |
VCID-zkyv-h5at-xkgq |
| summary |
Retbleed - arbitrary speculative code execution with return instructions |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23825 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.3369 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33723 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33561 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33605 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33638 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33633 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33591 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33569 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33602 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33578 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33546 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33387 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23825 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-23825, XSA-407
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq |
|
| 188 |
| url |
VCID-zr5e-e394-1fb4 |
| vulnerability_id |
VCID-zr5e-e394-1fb4 |
| summary |
kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2639 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78005 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78035 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78018 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78044 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78049 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78075 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78057 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78054 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78089 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78088 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78081 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01101 |
| scoring_system |
epss |
| scoring_elements |
0.78115 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2639 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2639
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5e-e394-1fb4 |
|
| 189 |
| url |
VCID-zrjz-h3jk-wuan |
| vulnerability_id |
VCID-zrjz-h3jk-wuan |
| summary |
kernel: brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1049 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16387 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1637 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16331 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16199 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16256 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16147 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16239 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16324 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49263 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49263
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zrjz-h3jk-wuan |
|
| 190 |
| url |
VCID-zuxk-225d-n7au |
| vulnerability_id |
VCID-zuxk-225d-n7au |
| summary |
kernel: LSM: general protection fault in legacy_parse_param |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15123 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15192 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1735 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17313 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17256 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17195 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17201 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17234 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17139 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.172 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17292 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49180
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zuxk-225d-n7au |
|
| 191 |
| url |
VCID-zymq-kwzh-2kfh |
| vulnerability_id |
VCID-zymq-kwzh-2kfh |
| summary |
kernel: tipc: move bc link creation back to tipc_node_create |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10785 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10848 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32948 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.3291 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32924 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32903 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32867 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32719 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32869 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00133 |
| scoring_system |
epss |
| scoring_elements |
0.32916 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-49664 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-49664
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zymq-kwzh-2kfh |
|