Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-162.6.1?arch=el9_1
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-162.6.1
Qualifiers
arch el9_1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-139u-14px-uucw
vulnerability_id VCID-139u-14px-uucw
summary kernel: tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49663.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49663
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21755
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21698
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21705
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49663
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347767
reference_id 2347767
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347767
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-49663
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-139u-14px-uucw
1
url VCID-1548-rz2a-h3hx
vulnerability_id VCID-1548-rz2a-h3hx
summary kernel: gso: do not skip outer ip header in case of ipip and net_failover
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48936.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48936.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307192
reference_id 2307192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307192
3
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2024:8856
reference_id RHSA-2024:8856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8856
6
reference_url https://access.redhat.com/errata/RHSA-2024:8870
reference_id RHSA-2024:8870
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8870
fixed_packages
aliases CVE-2022-48936
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1548-rz2a-h3hx
2
url VCID-15kx-xvbj-pkbn
vulnerability_id VCID-15kx-xvbj-pkbn
summary kernel: igc: avoid kernel warning when changing RX ring parameters
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49227.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49227
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.1998
published_at 2026-04-09T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.2
published_at 2026-04-11T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-12T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19897
published_at 2026-04-13T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19875
published_at 2026-04-16T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19879
published_at 2026-04-18T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19877
published_at 2026-04-21T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-24T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19846
published_at 2026-04-07T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19926
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49227
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347772
reference_id 2347772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347772
4
reference_url https://access.redhat.com/errata/RHSA-2022:1988
reference_id RHSA-2022:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1988
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49227
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-15kx-xvbj-pkbn
3
url VCID-18e7-kygq-cbay
vulnerability_id VCID-18e7-kygq-cbay
summary kernel: igc: Reinstate IGC_REMOVED logic and implement it properly
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49605.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49605
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12919
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12968
published_at 2026-04-04T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.34998
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35002
published_at 2026-04-11T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34966
published_at 2026-04-12T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.34942
published_at 2026-04-13T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.34981
published_at 2026-04-16T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34965
published_at 2026-04-18T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.34921
published_at 2026-04-21T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.34692
published_at 2026-04-24T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.34924
published_at 2026-04-07T12:55:00Z
11
value 0.00146
scoring_system epss
scoring_elements 0.34969
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49605
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348215
reference_id 2348215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348215
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49605
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18e7-kygq-cbay
4
url VCID-18mv-aj8j-2qg2
vulnerability_id VCID-18mv-aj8j-2qg2
summary kernel: usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49398.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49398
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-13T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-16T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23677
published_at 2026-04-18T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-21T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23544
published_at 2026-04-24T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-07T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49398
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348309
reference_id 2348309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348309
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49398
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-18mv-aj8j-2qg2
5
url VCID-19fj-8ey8-2fep
vulnerability_id VCID-19fj-8ey8-2fep
summary kernel: ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49348.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49348.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49348
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07234
published_at 2026-04-24T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07158
published_at 2026-04-16T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07135
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07259
published_at 2026-04-21T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07159
published_at 2026-04-07T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07214
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07245
published_at 2026-04-09T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07243
published_at 2026-04-11T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.0723
published_at 2026-04-12T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.0722
published_at 2026-04-13T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49348
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49348
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348038
reference_id 2348038
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348038
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49348
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-19fj-8ey8-2fep
6
url VCID-1bzf-phe4-a7bt
vulnerability_id VCID-1bzf-phe4-a7bt
summary kernel: bpf, cpumap: Handle skb as well when clean up ptr_ring
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53660.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53660
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03188
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03198
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03201
published_at 2026-04-07T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03205
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03231
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03185
published_at 2026-04-11T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03158
published_at 2026-04-12T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03142
published_at 2026-04-13T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03116
published_at 2026-04-16T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03123
published_at 2026-04-18T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03242
published_at 2026-04-21T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03243
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53660
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402238
reference_id 2402238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402238
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
fixed_packages
aliases CVE-2023-53660
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bzf-phe4-a7bt
7
url VCID-24k6-kgcc-fkev
vulnerability_id VCID-24k6-kgcc-fkev
summary kernel: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49145.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49145
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16113
published_at 2026-04-24T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16167
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16184
published_at 2026-04-18T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16221
published_at 2026-04-21T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16206
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16292
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16356
published_at 2026-04-09T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16337
published_at 2026-04-11T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16298
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.1623
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.1802
published_at 2026-04-02T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.18074
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49145
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49145
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348029
reference_id 2348029
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348029
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49145
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24k6-kgcc-fkev
8
url VCID-2a7t-t8ex-nkch
vulnerability_id VCID-2a7t-t8ex-nkch
summary kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49426.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49426
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33454
published_at 2026-04-24T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33818
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.3386
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33891
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33849
published_at 2026-04-12T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33824
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33862
published_at 2026-04-16T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33847
published_at 2026-04-18T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33816
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49426
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347804
reference_id 2347804
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347804
4
reference_url https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c
reference_id 9aa215450888cf29af0c479e14a712dc6b0c506c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/9aa215450888cf29af0c479e14a712dc6b0c506c
5
reference_url https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68
reference_id cbd23144f7662b00bcde32a938c4a4057e476d68
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/cbd23144f7662b00bcde32a938c4a4057e476d68
6
reference_url https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0
reference_id e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/e3cbbdbff8a4db5d053c53fd71be62ccccdb52b0
7
reference_url https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa
reference_id fc90f13ea0dcd960e5002d204fa55cec4e0db2fa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:10Z/
url https://git.kernel.org/stable/c/fc90f13ea0dcd960e5002d204fa55cec4e0db2fa
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49426
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a7t-t8ex-nkch
9
url VCID-2jda-3qf9-6kg2
vulnerability_id VCID-2jda-3qf9-6kg2
summary kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47580.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47580.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47580
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-01T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03207
published_at 2026-04-02T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03252
published_at 2026-04-24T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03248
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03204
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03177
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03156
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0313
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03137
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03257
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03216
published_at 2026-04-04T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03219
published_at 2026-04-07T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.03224
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47580
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293249
reference_id 2293249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293249
5
reference_url https://git.kernel.org/stable/c/3085147645938eb41f0bc0e25ef9791e71f5ee4b
reference_id 3085147645938eb41f0bc0e25ef9791e71f5ee4b
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:21:00Z/
url https://git.kernel.org/stable/c/3085147645938eb41f0bc0e25ef9791e71f5ee4b
6
reference_url https://git.kernel.org/stable/c/36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
reference_id 36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:21:00Z/
url https://git.kernel.org/stable/c/36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
7
reference_url https://git.kernel.org/stable/c/bdb854f134b964528fa543e0351022eb45bd7346
reference_id bdb854f134b964528fa543e0351022eb45bd7346
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-20T15:21:00Z/
url https://git.kernel.org/stable/c/bdb854f134b964528fa543e0351022eb45bd7346
8
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47580
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jda-3qf9-6kg2
10
url VCID-2uap-2vm1-efcr
vulnerability_id VCID-2uap-2vm1-efcr
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29900
reference_id
reference_type
scores
0
value 0.01411
scoring_system epss
scoring_elements 0.80477
published_at 2026-04-02T12:55:00Z
1
value 0.01411
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-24T12:55:00Z
2
value 0.01411
scoring_system epss
scoring_elements 0.80527
published_at 2026-04-09T12:55:00Z
3
value 0.01411
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-11T12:55:00Z
4
value 0.01411
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-12T12:55:00Z
5
value 0.01411
scoring_system epss
scoring_elements 0.80523
published_at 2026-04-13T12:55:00Z
6
value 0.01411
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-16T12:55:00Z
7
value 0.01411
scoring_system epss
scoring_elements 0.80554
published_at 2026-04-18T12:55:00Z
8
value 0.01411
scoring_system epss
scoring_elements 0.80558
published_at 2026-04-21T12:55:00Z
9
value 0.01411
scoring_system epss
scoring_elements 0.80498
published_at 2026-04-04T12:55:00Z
10
value 0.01411
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-07T12:55:00Z
11
value 0.01411
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
reference_id 2090226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
19
reference_url https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
reference_id amd-sb-1037
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
20
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.debian.org/security/2022/dsa-5207
21
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://security.gentoo.org/glsa/202402-07
22
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
reference_id MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
24
reference_url https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
reference_id retbleed-intel-and-amd-processor-information-disclosure-vulnerability
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
25
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
26
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
27
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
28
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
32
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
33
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
34
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
35
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
36
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
37
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
38
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
39
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
40
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
41
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
42
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
43
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
44
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
aliases CVE-2022-29900
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr
11
url VCID-2uct-bxdp-4ygm
vulnerability_id VCID-2uct-bxdp-4ygm
summary kernel: RDMA/hfi1: Fix potential integer multiplication overflow errors
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49404.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49404
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01423
published_at 2026-04-24T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09738
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09788
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13736
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13786
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13668
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13579
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13649
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348266
reference_id 2348266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348266
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49404
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uct-bxdp-4ygm
12
url VCID-3auk-78hr-2kg6
vulnerability_id VCID-3auk-78hr-2kg6
summary kernel: PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49265.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49265
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.1998
published_at 2026-04-09T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.2
published_at 2026-04-11T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19955
published_at 2026-04-12T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19897
published_at 2026-04-13T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19875
published_at 2026-04-16T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19879
published_at 2026-04-18T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19877
published_at 2026-04-21T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-24T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19846
published_at 2026-04-07T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19926
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49265
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348093
reference_id 2348093
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348093
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49265
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3auk-78hr-2kg6
13
url VCID-3cn4-nfwc-eff5
vulnerability_id VCID-3cn4-nfwc-eff5
summary kernel: dm raid: fix address sanitizer warning in raid_resume
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50085.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50085
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06508
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06498
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06488
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19811
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373463
reference_id 2373463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373463
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50085
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3cn4-nfwc-eff5
14
url VCID-3dsb-ehey-3ycd
vulnerability_id VCID-3dsb-ehey-3ycd
summary kernel: bfq: Avoid merging queues with different parents
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49412.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49412.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49412
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08643
published_at 2026-04-04T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08591
published_at 2026-04-02T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.33594
published_at 2026-04-24T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.33968
published_at 2026-04-07T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.3401
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34041
published_at 2026-04-11T12:55:00Z
6
value 0.00139
scoring_system epss
scoring_elements 0.33998
published_at 2026-04-12T12:55:00Z
7
value 0.00139
scoring_system epss
scoring_elements 0.33974
published_at 2026-04-13T12:55:00Z
8
value 0.00139
scoring_system epss
scoring_elements 0.34008
published_at 2026-04-16T12:55:00Z
9
value 0.00139
scoring_system epss
scoring_elements 0.33996
published_at 2026-04-18T12:55:00Z
10
value 0.00139
scoring_system epss
scoring_elements 0.33963
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49412
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348039
reference_id 2348039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348039
4
reference_url https://git.kernel.org/stable/c/5ee21edaed09e6b25f2c007b3f326752bc89bacf
reference_id 5ee21edaed09e6b25f2c007b3f326752bc89bacf
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:26Z/
url https://git.kernel.org/stable/c/5ee21edaed09e6b25f2c007b3f326752bc89bacf
5
reference_url https://git.kernel.org/stable/c/8abc8763b11c35e03cc91d59fd0cd28d39f88ca9
reference_id 8abc8763b11c35e03cc91d59fd0cd28d39f88ca9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:26Z/
url https://git.kernel.org/stable/c/8abc8763b11c35e03cc91d59fd0cd28d39f88ca9
6
reference_url https://git.kernel.org/stable/c/a16c65cca7d2c7ff965fdd3adc8df2156529caf1
reference_id a16c65cca7d2c7ff965fdd3adc8df2156529caf1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:26Z/
url https://git.kernel.org/stable/c/a16c65cca7d2c7ff965fdd3adc8df2156529caf1
7
reference_url https://git.kernel.org/stable/c/c1cee4ab36acef271be9101590756ed0c0c374d9
reference_id c1cee4ab36acef271be9101590756ed0c0c374d9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:26Z/
url https://git.kernel.org/stable/c/c1cee4ab36acef271be9101590756ed0c0c374d9
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49412
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3dsb-ehey-3ycd
15
url VCID-3tj9-e9p3-kyc3
vulnerability_id VCID-3tj9-e9p3-kyc3
summary kernel: usb: dwc3: host: Stop setting the ACPI companion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49306.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49306.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49306
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21755
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21698
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21705
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22358
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49306
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49306
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49306
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347702
reference_id 2347702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347702
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49306
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3tj9-e9p3-kyc3
16
url VCID-3zrw-j38p-e7dw
vulnerability_id VCID-3zrw-j38p-e7dw
summary kernel: ext4: add reserved GDT blocks check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49707.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49707.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49707
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01078
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01032
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01037
published_at 2026-04-08T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01035
published_at 2026-04-09T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.0102
published_at 2026-04-11T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01015
published_at 2026-04-12T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01014
published_at 2026-04-13T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01008
published_at 2026-04-16T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01017
published_at 2026-04-18T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01076
published_at 2026-04-21T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49707
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49707
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
reference_id 0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/0dc2fca8e4f9ac4a40e8424a10163369cca0cc06
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348100
reference_id 2348100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348100
6
reference_url https://git.kernel.org/stable/c/33b1bba31f4c784d33d2c2517964bdccdc9204cd
reference_id 33b1bba31f4c784d33d2c2517964bdccdc9204cd
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/33b1bba31f4c784d33d2c2517964bdccdc9204cd
7
reference_url https://git.kernel.org/stable/c/7c921328ac760bba780bdace41f4cd045f7f1405
reference_id 7c921328ac760bba780bdace41f4cd045f7f1405
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/7c921328ac760bba780bdace41f4cd045f7f1405
8
reference_url https://git.kernel.org/stable/c/af75c481a2e45e70f62f5942c93695e95bf7bd21
reference_id af75c481a2e45e70f62f5942c93695e95bf7bd21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/af75c481a2e45e70f62f5942c93695e95bf7bd21
9
reference_url https://git.kernel.org/stable/c/b55c3cd102a6f48b90e61c44f7f3dda8c290c694
reference_id b55c3cd102a6f48b90e61c44f7f3dda8c290c694
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/b55c3cd102a6f48b90e61c44f7f3dda8c290c694
10
reference_url https://git.kernel.org/stable/c/b9747263b13e5290ac4d63bec47e38f701303cad
reference_id b9747263b13e5290ac4d63bec47e38f701303cad
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/b9747263b13e5290ac4d63bec47e38f701303cad
11
reference_url https://git.kernel.org/stable/c/bfd004a1d3a062aac300523d406ac1f3e5f1a82c
reference_id bfd004a1d3a062aac300523d406ac1f3e5f1a82c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/bfd004a1d3a062aac300523d406ac1f3e5f1a82c
12
reference_url https://git.kernel.org/stable/c/fba54289176702a7caac0b64738406775817f451
reference_id fba54289176702a7caac0b64738406775817f451
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:32:29Z/
url https://git.kernel.org/stable/c/fba54289176702a7caac0b64738406775817f451
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49707
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3zrw-j38p-e7dw
17
url VCID-4429-qf2w-jqg3
vulnerability_id VCID-4429-qf2w-jqg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40284
published_at 2026-04-08T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40015
published_at 2026-04-24T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40231
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-09T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40308
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4027
published_at 2026-04-12T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40251
published_at 2026-04-13T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40298
published_at 2026-04-16T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-18T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.4019
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
reference_id 2090241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
aliases CVE-2022-21166, XSA-404
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3
18
url VCID-4qha-wssr-xycg
vulnerability_id VCID-4qha-wssr-xycg
summary kernel: nf_tables disallow binding to already bound chain
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39190.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39190.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39190
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15382
published_at 2026-04-24T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15286
published_at 2026-04-16T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15292
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.1534
published_at 2026-04-21T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.1537
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15457
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15507
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15471
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15433
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15368
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.18029
published_at 2026-04-02T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.18083
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39190
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39190
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2129152
reference_id 2129152
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2129152
5
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://usn.ubuntu.com/5729-1/
reference_id USN-5729-1
reference_type
scores
url https://usn.ubuntu.com/5729-1/
8
reference_url https://usn.ubuntu.com/5729-2/
reference_id USN-5729-2
reference_type
scores
url https://usn.ubuntu.com/5729-2/
fixed_packages
aliases CVE-2022-39190
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qha-wssr-xycg
19
url VCID-4r38-vuty-qfdw
vulnerability_id VCID-4r38-vuty-qfdw
summary kernel: ext4: avoid cycles in directory h-tree
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49343.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49343
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15282
published_at 2026-04-09T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15252
published_at 2026-04-11T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15213
published_at 2026-04-12T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15149
published_at 2026-04-13T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15062
published_at 2026-04-16T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15071
published_at 2026-04-18T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15122
published_at 2026-04-21T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15161
published_at 2026-04-24T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15143
published_at 2026-04-07T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15231
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49343
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348095
reference_id 2348095
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348095
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49343
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4r38-vuty-qfdw
20
url VCID-4w5c-d8pd-uqeb
vulnerability_id VCID-4w5c-d8pd-uqeb
summary kernel: use-after-free due to improper update of reference count in net/sched/cls_u32.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29581
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40141
published_at 2026-04-24T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40337
published_at 2026-04-11T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.403
published_at 2026-04-12T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-13T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40327
published_at 2026-04-16T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-18T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4022
published_at 2026-04-21T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42113
published_at 2026-04-07T12:55:00Z
8
value 0.00201
scoring_system epss
scoring_elements 0.42163
published_at 2026-04-08T12:55:00Z
9
value 0.00201
scoring_system epss
scoring_elements 0.42175
published_at 2026-04-09T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60155
published_at 2026-04-02T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60181
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2088021
reference_id 2088021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2088021
41
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
42
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
43
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
44
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
45
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
46
reference_url https://usn.ubuntu.com/5442-1/
reference_id USN-5442-1
reference_type
scores
url https://usn.ubuntu.com/5442-1/
47
reference_url https://usn.ubuntu.com/5442-2/
reference_id USN-5442-2
reference_type
scores
url https://usn.ubuntu.com/5442-2/
48
reference_url https://usn.ubuntu.com/5443-1/
reference_id USN-5443-1
reference_type
scores
url https://usn.ubuntu.com/5443-1/
49
reference_url https://usn.ubuntu.com/5443-2/
reference_id USN-5443-2
reference_type
scores
url https://usn.ubuntu.com/5443-2/
50
reference_url https://usn.ubuntu.com/5444-1/
reference_id USN-5444-1
reference_type
scores
url https://usn.ubuntu.com/5444-1/
fixed_packages
aliases CVE-2022-29581
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4w5c-d8pd-uqeb
21
url VCID-4xaf-p3np-2kbp
vulnerability_id VCID-4xaf-p3np-2kbp
summary kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1158.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1158
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04095
published_at 2026-04-01T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04172
published_at 2026-04-07T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04134
published_at 2026-04-02T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04153
published_at 2026-04-04T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04203
published_at 2026-04-08T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04218
published_at 2026-04-09T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04199
published_at 2026-04-11T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04182
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04158
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05153
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05307
published_at 2026-04-21T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05155
published_at 2026-04-18T12:55:00Z
12
value 0.0002
scoring_system epss
scoring_elements 0.05346
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069793
reference_id 2069793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069793
23
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
24
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
25
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
26
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
27
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
28
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2022:8673
reference_id RHSA-2022:8673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8673
32
reference_url https://access.redhat.com/errata/RHSA-2022:8685
reference_id RHSA-2022:8685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8685
33
reference_url https://access.redhat.com/errata/RHSA-2022:8686
reference_id RHSA-2022:8686
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8686
34
reference_url https://access.redhat.com/errata/RHSA-2022:8809
reference_id RHSA-2022:8809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8809
35
reference_url https://access.redhat.com/errata/RHSA-2022:8831
reference_id RHSA-2022:8831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8831
36
reference_url https://access.redhat.com/errata/RHSA-2022:8940
reference_id RHSA-2022:8940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8940
37
reference_url https://access.redhat.com/errata/RHSA-2022:8941
reference_id RHSA-2022:8941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8941
38
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
39
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
40
reference_url https://access.redhat.com/errata/RHSA-2022:8989
reference_id RHSA-2022:8989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8989
41
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
42
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
43
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
44
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
45
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
fixed_packages
aliases CVE-2022-1158
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xaf-p3np-2kbp
22
url VCID-5149-phe6-eqh5
vulnerability_id VCID-5149-phe6-eqh5
summary kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36946
reference_id
reference_type
scores
0
value 0.05077
scoring_system epss
scoring_elements 0.89823
published_at 2026-04-24T12:55:00Z
1
value 0.05077
scoring_system epss
scoring_elements 0.8976
published_at 2026-04-02T12:55:00Z
2
value 0.05077
scoring_system epss
scoring_elements 0.89775
published_at 2026-04-04T12:55:00Z
3
value 0.05077
scoring_system epss
scoring_elements 0.89779
published_at 2026-04-07T12:55:00Z
4
value 0.05077
scoring_system epss
scoring_elements 0.89796
published_at 2026-04-08T12:55:00Z
5
value 0.05077
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-09T12:55:00Z
6
value 0.05077
scoring_system epss
scoring_elements 0.89809
published_at 2026-04-11T12:55:00Z
7
value 0.05077
scoring_system epss
scoring_elements 0.89807
published_at 2026-04-12T12:55:00Z
8
value 0.05077
scoring_system epss
scoring_elements 0.898
published_at 2026-04-13T12:55:00Z
9
value 0.05077
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-18T12:55:00Z
10
value 0.05077
scoring_system epss
scoring_elements 0.89808
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115278
reference_id 2115278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115278
12
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
13
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
14
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
15
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
16
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://www.debian.org/security/2022/dsa-5207
17
reference_url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
reference_id ?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
18
reference_url https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
reference_id ?l=netfilter-devel&m=165883202007292&w=2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://marc.info/?l=netfilter-devel&m=165883202007292&w=2
19
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
20
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
21
reference_url https://security.netapp.com/advisory/ntap-20220901-0007/
reference_id ntap-20220901-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/
url https://security.netapp.com/advisory/ntap-20220901-0007/
22
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
23
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
24
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
25
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
26
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
27
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
28
reference_url https://usn.ubuntu.com/5590-1/
reference_id USN-5590-1
reference_type
scores
url https://usn.ubuntu.com/5590-1/
29
reference_url https://usn.ubuntu.com/5621-1/
reference_id USN-5621-1
reference_type
scores
url https://usn.ubuntu.com/5621-1/
30
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
31
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
32
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
33
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
34
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
35
reference_url https://usn.ubuntu.com/5634-1/
reference_id USN-5634-1
reference_type
scores
url https://usn.ubuntu.com/5634-1/
36
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
37
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
38
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
39
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
40
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
41
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
42
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
43
reference_url https://usn.ubuntu.com/5652-1/
reference_id USN-5652-1
reference_type
scores
url https://usn.ubuntu.com/5652-1/
44
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
45
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
46
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
47
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
fixed_packages
aliases CVE-2022-36946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5149-phe6-eqh5
23
url VCID-56gq-qmzj-1yaj
vulnerability_id VCID-56gq-qmzj-1yaj
summary kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47639.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47639
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05307
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05199
published_at 2026-04-11T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05183
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05168
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05114
published_at 2026-04-16T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05118
published_at 2026-04-18T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05269
published_at 2026-04-21T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11168
published_at 2026-04-01T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25784
published_at 2026-04-09T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-07T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25736
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47639
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/0c8a8da182d4333d9bbb9131d765145568c847b2
reference_id 0c8a8da182d4333d9bbb9131d765145568c847b2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/0c8a8da182d4333d9bbb9131d765145568c847b2
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348067
reference_id 2348067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348067
5
reference_url https://git.kernel.org/stable/c/8cf6f98ab1d16d5e607635a0c21c4231eb15367e
reference_id 8cf6f98ab1d16d5e607635a0c21c4231eb15367e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/8cf6f98ab1d16d5e607635a0c21c4231eb15367e
6
reference_url https://git.kernel.org/stable/c/af47248407c0c5ae52a752af1ab5ce5b0db91502
reference_id af47248407c0c5ae52a752af1ab5ce5b0db91502
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/af47248407c0c5ae52a752af1ab5ce5b0db91502
7
reference_url https://git.kernel.org/stable/c/d62007edf01f5c11f75d0f4b1e538fc52a5b1982
reference_id d62007edf01f5c11f75d0f4b1e538fc52a5b1982
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:52Z/
url https://git.kernel.org/stable/c/d62007edf01f5c11f75d0f4b1e538fc52a5b1982
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47639
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56gq-qmzj-1yaj
24
url VCID-5pt2-wwc2-zbfy
vulnerability_id VCID-5pt2-wwc2-zbfy
summary kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1016
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02384
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02543
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.0249
published_at 2026-04-09T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02461
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02445
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02451
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02556
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02454
published_at 2026-04-02T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02466
published_at 2026-04-04T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-07T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.0247
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1016
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066614
reference_id 2066614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2066614
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
49
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
50
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
51
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
52
reference_url https://access.redhat.com/errata/RHSA-2023:4137
reference_id RHSA-2023:4137
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4137
53
reference_url https://access.redhat.com/errata/RHSA-2023:4138
reference_id RHSA-2023:4138
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4138
54
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
55
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
56
reference_url https://usn.ubuntu.com/5383-1/
reference_id USN-5383-1
reference_type
scores
url https://usn.ubuntu.com/5383-1/
57
reference_url https://usn.ubuntu.com/5390-1/
reference_id USN-5390-1
reference_type
scores
url https://usn.ubuntu.com/5390-1/
58
reference_url https://usn.ubuntu.com/5390-2/
reference_id USN-5390-2
reference_type
scores
url https://usn.ubuntu.com/5390-2/
59
reference_url https://usn.ubuntu.com/5415-1/
reference_id USN-5415-1
reference_type
scores
url https://usn.ubuntu.com/5415-1/
60
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
61
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
62
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
63
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-1016
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5pt2-wwc2-zbfy
25
url VCID-5rym-k4vn-nye8
vulnerability_id VCID-5rym-k4vn-nye8
summary kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1852
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04431
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04469
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04494
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04507
published_at 2026-04-07T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04543
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04558
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04546
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04531
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04516
published_at 2026-04-13T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04488
published_at 2026-04-16T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04497
published_at 2026-04-18T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04633
published_at 2026-04-21T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04675
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2089815
reference_id 2089815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2089815
17
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
18
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
19
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
20
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
21
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
22
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
23
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
24
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
25
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
26
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
27
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
fixed_packages
aliases CVE-2022-1852
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5rym-k4vn-nye8
26
url VCID-5vp9-ejh8-bbcr
vulnerability_id VCID-5vp9-ejh8-bbcr
summary kernel: ceph: fix inode reference leakage in ceph_get_snapdir()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49109.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49109.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49109
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01653
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01562
published_at 2026-04-11T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01553
published_at 2026-04-13T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01542
published_at 2026-04-16T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01556
published_at 2026-04-18T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01645
published_at 2026-04-21T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16983
published_at 2026-04-07T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.17073
published_at 2026-04-08T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.1713
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49109
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347730
reference_id 2347730
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347730
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49109
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vp9-ejh8-bbcr
27
url VCID-5zzw-du1s-gyf2
vulnerability_id VCID-5zzw-du1s-gyf2
summary hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26373
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28903
published_at 2026-04-02T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28611
published_at 2026-04-24T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28759
published_at 2026-04-07T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28826
published_at 2026-04-08T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-09T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28872
published_at 2026-04-11T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28827
published_at 2026-04-12T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28778
published_at 2026-04-13T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28797
published_at 2026-04-16T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28774
published_at 2026-04-18T12:55:00Z
10
value 0.00106
scoring_system epss
scoring_elements 0.28725
published_at 2026-04-21T12:55:00Z
11
value 0.00106
scoring_system epss
scoring_elements 0.28953
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2115065
reference_id 2115065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2115065
12
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
reference_id intel-sa-00706.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00706.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
reference_id msg00000.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
14
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
15
reference_url https://security.netapp.com/advisory/ntap-20221007-0005/
reference_id ntap-20221007-0005
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:22Z/
url https://security.netapp.com/advisory/ntap-20221007-0005/
16
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
17
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
18
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
19
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
20
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
21
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
22
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
23
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
24
reference_url https://access.redhat.com/errata/RHSA-2023:0440
reference_id RHSA-2023:0440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0440
25
reference_url https://usn.ubuntu.com/5667-1/
reference_id USN-5667-1
reference_type
scores
url https://usn.ubuntu.com/5667-1/
26
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
27
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
28
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
29
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
30
reference_url https://usn.ubuntu.com/5703-1/
reference_id USN-5703-1
reference_type
scores
url https://usn.ubuntu.com/5703-1/
31
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
32
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
33
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
34
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
35
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
36
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
37
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
38
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
39
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
40
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
aliases CVE-2022-26373
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5zzw-du1s-gyf2
28
url VCID-62xu-hs8g-gyhq
vulnerability_id VCID-62xu-hs8g-gyhq
summary kernel: remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49188.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49188.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49188
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22068
published_at 2026-04-09T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22082
published_at 2026-04-11T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22041
published_at 2026-04-12T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21981
published_at 2026-04-13T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21979
published_at 2026-04-16T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21974
published_at 2026-04-18T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.2193
published_at 2026-04-21T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21783
published_at 2026-04-24T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21932
published_at 2026-04-07T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.22013
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49188
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49188
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348028
reference_id 2348028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348028
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49188
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-62xu-hs8g-gyhq
29
url VCID-6a92-c98x-uqfe
vulnerability_id VCID-6a92-c98x-uqfe
summary kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49534.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49534
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09313
published_at 2026-04-04T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09262
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.2155
published_at 2026-04-24T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24674
published_at 2026-04-13T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24658
published_at 2026-04-21T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24679
published_at 2026-04-18T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24687
published_at 2026-04-16T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24643
published_at 2026-04-07T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24711
published_at 2026-04-08T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24759
published_at 2026-04-09T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24771
published_at 2026-04-11T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24731
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347930
reference_id 2347930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347930
5
reference_url https://git.kernel.org/stable/c/672d1cb40551ea9c95efad43ab6d45e4ab4e015f
reference_id 672d1cb40551ea9c95efad43ab6d45e4ab4e015f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:49Z/
url https://git.kernel.org/stable/c/672d1cb40551ea9c95efad43ab6d45e4ab4e015f
6
reference_url https://git.kernel.org/stable/c/c00df0f34a6d5e14da379f96ea67e501ce67b002
reference_id c00df0f34a6d5e14da379f96ea67e501ce67b002
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:49Z/
url https://git.kernel.org/stable/c/c00df0f34a6d5e14da379f96ea67e501ce67b002
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49534
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6a92-c98x-uqfe
30
url VCID-6ca4-5f11-eqfv
vulnerability_id VCID-6ca4-5f11-eqfv
summary kernel: ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50115.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50115
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06033
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06078
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0606
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06101
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06141
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06132
published_at 2026-04-11T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06127
published_at 2026-04-12T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.0612
published_at 2026-04-13T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18874
published_at 2026-04-24T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18963
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18976
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18981
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50115
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373645
reference_id 2373645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373645
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50115
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ca4-5f11-eqfv
31
url VCID-6fxv-3tch-23cq
vulnerability_id VCID-6fxv-3tch-23cq
summary kernel: scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50027.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50027.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50027
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50027
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373520
reference_id 2373520
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373520
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50027
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fxv-3tch-23cq
32
url VCID-6pqs-2x2k-vyc5
vulnerability_id VCID-6pqs-2x2k-vyc5
summary kernel: tcp: add accessors to read/set tp->snd_cwnd
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49325.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49325
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06838
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06886
published_at 2026-04-04T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14658
published_at 2026-04-09T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14617
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14579
published_at 2026-04-12T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14518
published_at 2026-04-13T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14409
published_at 2026-04-16T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14412
published_at 2026-04-18T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14483
published_at 2026-04-21T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14517
published_at 2026-04-24T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14511
published_at 2026-04-07T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.146
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49325
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49325
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348023
reference_id 2348023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348023
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49325
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pqs-2x2k-vyc5
33
url VCID-6pvh-2n4u-7yaw
vulnerability_id VCID-6pvh-2n4u-7yaw
summary kernel: dm ioctl: prevent potential spectre v1 gadget
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49122.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49122
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01669
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01568
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01556
published_at 2026-04-16T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01571
published_at 2026-04-18T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0166
published_at 2026-04-21T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02166
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02167
published_at 2026-04-07T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02168
published_at 2026-04-08T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02189
published_at 2026-04-09T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16755
published_at 2026-04-02T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16814
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49122
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348154
reference_id 2348154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348154
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2025:10005
reference_id RHSA-2025:10005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10005
8
reference_url https://access.redhat.com/errata/RHSA-2025:10009
reference_id RHSA-2025:10009
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10009
9
reference_url https://access.redhat.com/errata/RHSA-2025:10179
reference_id RHSA-2025:10179
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10179
10
reference_url https://access.redhat.com/errata/RHSA-2025:10829
reference_id RHSA-2025:10829
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10829
11
reference_url https://access.redhat.com/errata/RHSA-2025:10830
reference_id RHSA-2025:10830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10830
fixed_packages
aliases CVE-2022-49122
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6pvh-2n4u-7yaw
34
url VCID-791q-n1py-47ah
vulnerability_id VCID-791q-n1py-47ah
summary kernel: powerpc/rtas: Keep MSR[RI] set when calling RTAS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49440.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49440
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08319
published_at 2026-04-04T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31739
published_at 2026-04-09T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31742
published_at 2026-04-11T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-12T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31666
published_at 2026-04-13T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31699
published_at 2026-04-16T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31677
published_at 2026-04-18T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31645
published_at 2026-04-21T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31467
published_at 2026-04-24T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31658
published_at 2026-04-07T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.3171
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49440
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348108
reference_id 2348108
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348108
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:0512
reference_id RHSA-2023:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0512
fixed_packages
aliases CVE-2022-49440
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-791q-n1py-47ah
35
url VCID-7csu-6ca9-4ucq
vulnerability_id VCID-7csu-6ca9-4ucq
summary kernel: udmabuf: improper validation of array index leading to local privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2008.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2008.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2008
reference_id
reference_type
scores
0
value 0.0112
scoring_system epss
scoring_elements 0.7819
published_at 2026-04-02T12:55:00Z
1
value 0.0112
scoring_system epss
scoring_elements 0.78239
published_at 2026-04-13T12:55:00Z
2
value 0.0112
scoring_system epss
scoring_elements 0.78244
published_at 2026-04-12T12:55:00Z
3
value 0.0112
scoring_system epss
scoring_elements 0.7826
published_at 2026-04-11T12:55:00Z
4
value 0.0112
scoring_system epss
scoring_elements 0.78234
published_at 2026-04-09T12:55:00Z
5
value 0.0112
scoring_system epss
scoring_elements 0.78229
published_at 2026-04-08T12:55:00Z
6
value 0.0112
scoring_system epss
scoring_elements 0.7822
published_at 2026-04-04T12:55:00Z
7
value 0.0112
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-07T12:55:00Z
8
value 0.01547
scoring_system epss
scoring_elements 0.81461
published_at 2026-04-24T12:55:00Z
9
value 0.01547
scoring_system epss
scoring_elements 0.81438
published_at 2026-04-18T12:55:00Z
10
value 0.01547
scoring_system epss
scoring_elements 0.8144
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2008
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4
reference_id 05b252cccb2e5c3f56119d25de684b4f810ba4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:40Z/
url https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186862
reference_id 2186862
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:40Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2186862
6
reference_url https://security.netapp.com/advisory/ntap-20230517-0007/
reference_id ntap-20230517-0007
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:40Z/
url https://security.netapp.com/advisory/ntap-20230517-0007/
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2023:3465
reference_id RHSA-2023:3465
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3465
10
reference_url https://access.redhat.com/errata/RHSA-2023:3470
reference_id RHSA-2023:3470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3470
11
reference_url https://access.redhat.com/errata/RHSA-2023:3490
reference_id RHSA-2023:3490
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3490
12
reference_url https://www.zerodayinitiative.com/advisories/ZDI-23-441/
reference_id ZDI-23-441
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:40Z/
url https://www.zerodayinitiative.com/advisories/ZDI-23-441/
fixed_packages
aliases CVE-2023-2008
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7csu-6ca9-4ucq
36
url VCID-7ds1-kkxr-b7gx
vulnerability_id VCID-7ds1-kkxr-b7gx
summary kernel: netfilter: nf_tables: possible module reference underflow in error path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50048.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50048
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50048
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373580
reference_id 2373580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373580
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
6
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2022-50048
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ds1-kkxr-b7gx
37
url VCID-7e2m-a86y-c3bd
vulnerability_id VCID-7e2m-a86y-c3bd
summary kernel: media: em28xx: initialize refcount before kref_get
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07549
published_at 2026-04-24T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07568
published_at 2026-04-11T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-12T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07542
published_at 2026-04-13T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07588
published_at 2026-04-21T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-16T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07487
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07546
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
reference_id 2127985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2127985
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
12
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
13
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
14
reference_url https://usn.ubuntu.com/5757-1/
reference_id USN-5757-1
reference_type
scores
url https://usn.ubuntu.com/5757-1/
15
reference_url https://usn.ubuntu.com/5757-2/
reference_id USN-5757-2
reference_type
scores
url https://usn.ubuntu.com/5757-2/
16
reference_url https://usn.ubuntu.com/5758-1/
reference_id USN-5758-1
reference_type
scores
url https://usn.ubuntu.com/5758-1/
17
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-3239
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7e2m-a86y-c3bd
38
url VCID-7m61-6vud-xbhc
vulnerability_id VCID-7m61-6vud-xbhc
summary kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50536.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50536
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-11T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-12T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-13T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03045
published_at 2026-04-16T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03054
published_at 2026-04-18T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03172
published_at 2026-04-21T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03175
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2402257
reference_id 2402257
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2402257
5
reference_url https://access.redhat.com/errata/RHSA-2022:1988
reference_id RHSA-2022:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1988
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2023:6583
reference_id RHSA-2023:6583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6583
fixed_packages
aliases CVE-2022-50536
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7m61-6vud-xbhc
39
url VCID-7nsd-5rzy-c7a2
vulnerability_id VCID-7nsd-5rzy-c7a2
summary kernel: ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49238.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49238.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49238
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14496
published_at 2026-04-04T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14429
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24783
published_at 2026-04-24T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24911
published_at 2026-04-12T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24856
published_at 2026-04-13T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24868
published_at 2026-04-16T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24861
published_at 2026-04-18T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24839
published_at 2026-04-21T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24821
published_at 2026-04-07T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24889
published_at 2026-04-08T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24935
published_at 2026-04-09T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.2495
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49238
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/212ad7cb7d7592669c067125949e0a8e31ce6a0b
reference_id 212ad7cb7d7592669c067125949e0a8e31ce6a0b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:59Z/
url https://git.kernel.org/stable/c/212ad7cb7d7592669c067125949e0a8e31ce6a0b
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348142
reference_id 2348142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348142
5
reference_url https://git.kernel.org/stable/c/400705c50bbf184794c885d1efad7fe9ccf1471a
reference_id 400705c50bbf184794c885d1efad7fe9ccf1471a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:59Z/
url https://git.kernel.org/stable/c/400705c50bbf184794c885d1efad7fe9ccf1471a
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49238
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7nsd-5rzy-c7a2
40
url VCID-7qyk-a688-n3bx
vulnerability_id VCID-7qyk-a688-n3bx
summary kernel: veth: Ensure eth header is in skb's linear part
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49066.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49066
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15339
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.1527
published_at 2026-04-02T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00735
published_at 2026-04-24T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00692
published_at 2026-04-18T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00686
published_at 2026-04-16T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00733
published_at 2026-04-21T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.0075
published_at 2026-04-11T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00922
published_at 2026-04-09T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00925
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49066
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348115
reference_id 2348115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348115
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49066
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qyk-a688-n3bx
41
url VCID-7s6p-4hc7-wkbc
vulnerability_id VCID-7s6p-4hc7-wkbc
summary kernel: exec: Force single empty string when argv is empty
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49264.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49264
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01236
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01162
published_at 2026-04-18T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.0115
published_at 2026-04-16T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01232
published_at 2026-04-21T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01173
published_at 2026-04-07T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01179
published_at 2026-04-08T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.0118
published_at 2026-04-09T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01166
published_at 2026-04-11T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01158
published_at 2026-04-12T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07529
published_at 2026-04-02T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347695
reference_id 2347695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347695
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49264
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7s6p-4hc7-wkbc
42
url VCID-7xpp-ndqq-8be6
vulnerability_id VCID-7xpp-ndqq-8be6
summary kernel: media: usb: go7007: s2250-board: fix leak in probe()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49253.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49253
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01394
published_at 2026-04-24T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09738
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09788
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13736
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13786
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13668
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13579
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13649
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49253
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49253
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347872
reference_id 2347872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347872
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49253
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xpp-ndqq-8be6
43
url VCID-834p-5e5a-zud6
vulnerability_id VCID-834p-5e5a-zud6
summary kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47378.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47378
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.25098
published_at 2026-04-01T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25178
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24931
published_at 2026-04-24T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25103
published_at 2026-04-09T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25117
published_at 2026-04-11T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25077
published_at 2026-04-12T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.25022
published_at 2026-04-13T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25031
published_at 2026-04-16T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25023
published_at 2026-04-18T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24994
published_at 2026-04-21T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.2522
published_at 2026-04-04T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.2499
published_at 2026-04-07T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.25058
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282362
reference_id 2282362
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282362
5
reference_url https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744
reference_id 9817d763dbe15327b9b3ff4404fa6f27f927e744
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-16T21:04:16Z/
url https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744
6
reference_url https://git.kernel.org/stable/c/d268a182c56e8361e19fb781137411643312b994
reference_id d268a182c56e8361e19fb781137411643312b994
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-16T21:04:16Z/
url https://git.kernel.org/stable/c/d268a182c56e8361e19fb781137411643312b994
7
reference_url https://git.kernel.org/stable/c/ecf0dc5a904830c926a64feffd8e01141f89822f
reference_id ecf0dc5a904830c926a64feffd8e01141f89822f
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-16T21:04:16Z/
url https://git.kernel.org/stable/c/ecf0dc5a904830c926a64feffd8e01141f89822f
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2024:6297
reference_id RHSA-2024:6297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6297
fixed_packages
aliases CVE-2021-47378
risk_score 3.9
exploitability 0.5
weighted_severity 7.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-834p-5e5a-zud6
44
url VCID-8gr5-zvxj-mbb3
vulnerability_id VCID-8gr5-zvxj-mbb3
summary kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49288.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49288
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08241
published_at 2026-04-04T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08186
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17103
published_at 2026-04-24T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17163
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17254
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17312
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17326
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17277
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17218
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17157
published_at 2026-04-16T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17162
published_at 2026-04-18T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17198
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49288
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49288
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347877
reference_id 2347877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347877
5
reference_url https://git.kernel.org/stable/c/37b12c16beb6f6c1c3c678c1aacbc46525c250f7
reference_id 37b12c16beb6f6c1c3c678c1aacbc46525c250f7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/37b12c16beb6f6c1c3c678c1aacbc46525c250f7
6
reference_url https://git.kernel.org/stable/c/51fce708ab8986a9879ee5da946a2cc120f1036d
reference_id 51fce708ab8986a9879ee5da946a2cc120f1036d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/51fce708ab8986a9879ee5da946a2cc120f1036d
7
reference_url https://git.kernel.org/stable/c/5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6
reference_id 5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6
8
reference_url https://git.kernel.org/stable/c/69534c48ba8ce552ce383b3dfdb271ffe51820c3
reference_id 69534c48ba8ce552ce383b3dfdb271ffe51820c3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/69534c48ba8ce552ce383b3dfdb271ffe51820c3
9
reference_url https://git.kernel.org/stable/c/a21d2f323b5a978dedf9ff1d50f101f85e39b3f2
reference_id a21d2f323b5a978dedf9ff1d50f101f85e39b3f2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/a21d2f323b5a978dedf9ff1d50f101f85e39b3f2
10
reference_url https://git.kernel.org/stable/c/b560d670c87d7d40b3cf6949246fa4c7aa65a00a
reference_id b560d670c87d7d40b3cf6949246fa4c7aa65a00a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/b560d670c87d7d40b3cf6949246fa4c7aa65a00a
11
reference_url https://git.kernel.org/stable/c/e14dca613e0a6ddc2bf6e360f16936a9f865205b
reference_id e14dca613e0a6ddc2bf6e360f16936a9f865205b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/e14dca613e0a6ddc2bf6e360f16936a9f865205b
12
reference_url https://git.kernel.org/stable/c/e7786c445bb67a9a6e64f66ebd6b7215b153ff7d
reference_id e7786c445bb67a9a6e64f66ebd6b7215b153ff7d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:50Z/
url https://git.kernel.org/stable/c/e7786c445bb67a9a6e64f66ebd6b7215b153ff7d
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49288
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8gr5-zvxj-mbb3
45
url VCID-8gx9-2a2j-tffv
vulnerability_id VCID-8gx9-2a2j-tffv
summary kernel: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50212.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50212
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06356
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06401
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0639
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06437
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06469
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06458
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19723
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19816
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50212
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373623
reference_id 2373623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373623
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50212
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8gx9-2a2j-tffv
46
url VCID-8m61-w5gs-gua7
vulnerability_id VCID-8m61-w5gs-gua7
summary kernel: mt76: mt7921: fix crash when startup fails.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49129.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49129.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49129
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22065
published_at 2026-04-24T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22207
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2229
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22344
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22365
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22323
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22264
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22269
published_at 2026-04-16T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22263
published_at 2026-04-18T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22215
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49129
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347839
reference_id 2347839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347839
4
reference_url https://git.kernel.org/stable/c/38fbe806645090c07aa97171f20fc62c3d7d3a98
reference_id 38fbe806645090c07aa97171f20fc62c3d7d3a98
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/38fbe806645090c07aa97171f20fc62c3d7d3a98
5
reference_url https://git.kernel.org/stable/c/827e7799c61b978fbc2cc9dac66cb62401b2b3f0
reference_id 827e7799c61b978fbc2cc9dac66cb62401b2b3f0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/827e7799c61b978fbc2cc9dac66cb62401b2b3f0
6
reference_url https://git.kernel.org/stable/c/ac1260b661c2ef0d0a56680cdb5672b931b7be8f
reference_id ac1260b661c2ef0d0a56680cdb5672b931b7be8f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/ac1260b661c2ef0d0a56680cdb5672b931b7be8f
7
reference_url https://git.kernel.org/stable/c/c1a5e6002ec441a3b9fb4d048b4b49ae93409a46
reference_id c1a5e6002ec441a3b9fb4d048b4b49ae93409a46
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:14Z/
url https://git.kernel.org/stable/c/c1a5e6002ec441a3b9fb4d048b4b49ae93409a46
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49129
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m61-w5gs-gua7
47
url VCID-8tv2-9rnq-dqf7
vulnerability_id VCID-8tv2-9rnq-dqf7
summary kernel: inet: fully convert sk->sk_rx_dst to RCU rules
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47103.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47103
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09354
published_at 2026-04-07T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09489
published_at 2026-04-11T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09476
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09428
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09338
published_at 2026-04-18T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09445
published_at 2026-04-13T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09462
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.09991
published_at 2026-04-01T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10113
published_at 2026-04-02T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10177
published_at 2026-04-04T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-24T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11034
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
reference_id 0249a4b8a554f2eb6a27b62516fa50168584faa4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267914
reference_id 2267914
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267914
6
reference_url https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
reference_id 68c34ce11ef23328692aa35fa6aaafdd75913100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
7
reference_url https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
reference_id 75a578000ae5e511e5d0e8433c94a14d9c99c412
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
8
reference_url https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
reference_id 8f905c0e7354ef261360fb7535ea079b1082c105
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
9
reference_url https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
reference_id 92e6e36ecd16808866ac6172b9491b5097cde449
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
10
reference_url https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
reference_id c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
11
reference_url https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
reference_id f039b43cbaea5e0700980c2f0052da05a70782e0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:23:27Z/
url https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
14
reference_url https://usn.ubuntu.com/7332-1/
reference_id USN-7332-1
reference_type
scores
url https://usn.ubuntu.com/7332-1/
15
reference_url https://usn.ubuntu.com/7332-2/
reference_id USN-7332-2
reference_type
scores
url https://usn.ubuntu.com/7332-2/
16
reference_url https://usn.ubuntu.com/7332-3/
reference_id USN-7332-3
reference_type
scores
url https://usn.ubuntu.com/7332-3/
fixed_packages
aliases CVE-2021-47103
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv2-9rnq-dqf7
48
url VCID-8zmf-w8w9-bydm
vulnerability_id VCID-8zmf-w8w9-bydm
summary kernel: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50095.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50095
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06356
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06401
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.0639
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06437
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06475
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06469
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06458
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19723
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19816
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373693
reference_id 2373693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373693
5
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50095
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zmf-w8w9-bydm
49
url VCID-9133-4vru-fucq
vulnerability_id VCID-9133-4vru-fucq
summary kernel: possible to use the debugger to write zero into a location of choice
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21499.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21499
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39053
published_at 2026-04-24T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39305
published_at 2026-04-07T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.3936
published_at 2026-04-08T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39378
published_at 2026-04-09T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-11T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.3935
published_at 2026-04-12T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39331
published_at 2026-04-13T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39384
published_at 2026-04-16T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39355
published_at 2026-04-18T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39268
published_at 2026-04-21T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39367
published_at 2026-04-02T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39391
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21499
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084183
reference_id 2084183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084183
17
reference_url https://security.archlinux.org/AVG-2740
reference_id AVG-2740
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2740
18
reference_url https://security.archlinux.org/AVG-2741
reference_id AVG-2741
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2741
19
reference_url https://security.archlinux.org/AVG-2742
reference_id AVG-2742
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2742
20
reference_url https://security.archlinux.org/AVG-2743
reference_id AVG-2743
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2743
21
reference_url https://www.debian.org/security/2022/dsa-5161
reference_id dsa-5161
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T13:49:06Z/
url https://www.debian.org/security/2022/dsa-5161
22
reference_url https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
reference_id eadb2f47a3ced5c64b23b90fd2a3463f63726066
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T13:49:06Z/
url https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
23
reference_url http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-24T13:49:06Z/
url http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
24
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
25
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
26
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
27
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
28
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
29
reference_url https://usn.ubuntu.com/5465-1/
reference_id USN-5465-1
reference_type
scores
url https://usn.ubuntu.com/5465-1/
30
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
31
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
32
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
33
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
34
reference_url https://usn.ubuntu.com/5470-1/
reference_id USN-5470-1
reference_type
scores
url https://usn.ubuntu.com/5470-1/
35
reference_url https://usn.ubuntu.com/5471-1/
reference_id USN-5471-1
reference_type
scores
url https://usn.ubuntu.com/5471-1/
36
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
fixed_packages
aliases CVE-2022-21499
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9133-4vru-fucq
50
url VCID-978p-j5hf-rqbq
vulnerability_id VCID-978p-j5hf-rqbq
summary kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47556.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47556
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08875
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08881
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08979
published_at 2026-04-24T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08806
published_at 2026-04-16T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.0878
published_at 2026-04-18T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08932
published_at 2026-04-21T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08931
published_at 2026-04-04T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08863
published_at 2026-04-07T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.0894
published_at 2026-04-08T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08968
published_at 2026-04-09T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08965
published_at 2026-04-11T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.0893
published_at 2026-04-12T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08917
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47556
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/0276af2176c78771da7f311621a25d7608045827
reference_id 0276af2176c78771da7f311621a25d7608045827
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:17Z/
url https://git.kernel.org/stable/c/0276af2176c78771da7f311621a25d7608045827
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2283393
reference_id 2283393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2283393
5
reference_url https://git.kernel.org/stable/c/abfdd9e2f0f9699015d72317f74154d3e53664e6
reference_id abfdd9e2f0f9699015d72317f74154d3e53664e6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:17Z/
url https://git.kernel.org/stable/c/abfdd9e2f0f9699015d72317f74154d3e53664e6
6
reference_url https://access.redhat.com/errata/RHSA-2022:1975
reference_id RHSA-2022:1975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1975
7
reference_url https://access.redhat.com/errata/RHSA-2022:1988
reference_id RHSA-2022:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1988
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47556
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-978p-j5hf-rqbq
51
url VCID-97ym-aqgz-ybbq
vulnerability_id VCID-97ym-aqgz-ybbq
summary kernel: dm mirror log: round up region bitmap size to BITS_PER_LONG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49710.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49710
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.2842
published_at 2026-04-09T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28424
published_at 2026-04-11T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2838
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28322
published_at 2026-04-13T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28334
published_at 2026-04-16T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28313
published_at 2026-04-18T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28267
published_at 2026-04-21T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28172
published_at 2026-04-24T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28311
published_at 2026-04-07T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28377
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49710
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347643
reference_id 2347643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347643
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49710
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97ym-aqgz-ybbq
52
url VCID-9gux-pynq-nyhz
vulnerability_id VCID-9gux-pynq-nyhz
summary kernel: ext4: fix use-after-free in ext4_rename_dir_prepare
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49349.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49349.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49349
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07696
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.162
published_at 2026-04-24T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16291
published_at 2026-04-07T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16376
published_at 2026-04-08T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16435
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16418
published_at 2026-04-11T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16379
published_at 2026-04-12T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16316
published_at 2026-04-13T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16254
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16275
published_at 2026-04-18T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1631
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49349
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49349
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0be698ecbe4471fcad80e81ec6a05001421041b3
reference_id 0be698ecbe4471fcad80e81ec6a05001421041b3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/0be698ecbe4471fcad80e81ec6a05001421041b3
5
reference_url https://git.kernel.org/stable/c/0ff38b99fa075ddd246487a28cb9af049f4ceef1
reference_id 0ff38b99fa075ddd246487a28cb9af049f4ceef1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/0ff38b99fa075ddd246487a28cb9af049f4ceef1
6
reference_url https://git.kernel.org/stable/c/10801095224de0d0ab06ae60698680c1f883a3ae
reference_id 10801095224de0d0ab06ae60698680c1f883a3ae
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/10801095224de0d0ab06ae60698680c1f883a3ae
7
reference_url https://git.kernel.org/stable/c/1a3a15bf6f9963d755270cbdb282863b84839195
reference_id 1a3a15bf6f9963d755270cbdb282863b84839195
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/1a3a15bf6f9963d755270cbdb282863b84839195
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348203
reference_id 2348203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348203
9
reference_url https://git.kernel.org/stable/c/364380c00912bed9b5d99eb485018360b0ecf64f
reference_id 364380c00912bed9b5d99eb485018360b0ecf64f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/364380c00912bed9b5d99eb485018360b0ecf64f
10
reference_url https://git.kernel.org/stable/c/4a2bea60cf7ff957b3eda0b17750d483876a02fa
reference_id 4a2bea60cf7ff957b3eda0b17750d483876a02fa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/4a2bea60cf7ff957b3eda0b17750d483876a02fa
11
reference_url https://git.kernel.org/stable/c/97f802a652a749422dede32071d29a53cf4bd034
reference_id 97f802a652a749422dede32071d29a53cf4bd034
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/97f802a652a749422dede32071d29a53cf4bd034
12
reference_url https://git.kernel.org/stable/c/dd887f83ea54aea5b780a84527e23ab95f777fed
reference_id dd887f83ea54aea5b780a84527e23ab95f777fed
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/dd887f83ea54aea5b780a84527e23ab95f777fed
13
reference_url https://git.kernel.org/stable/c/eaecf7ebfd5dd09038a80b14be46b844f54cfc5c
reference_id eaecf7ebfd5dd09038a80b14be46b844f54cfc5c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:42Z/
url https://git.kernel.org/stable/c/eaecf7ebfd5dd09038a80b14be46b844f54cfc5c
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49349
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9gux-pynq-nyhz
53
url VCID-9mpd-j8a4-dkau
vulnerability_id VCID-9mpd-j8a4-dkau
summary kernel: net: preserve skb_end_offset() in skb_unclone_keeptruesize()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49142.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49142.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49142
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21755
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21698
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21705
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49142
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49142
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347898
reference_id 2347898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347898
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49142
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mpd-j8a4-dkau
54
url VCID-9nut-ha7g-dbbc
vulnerability_id VCID-9nut-ha7g-dbbc
summary kernel: scsi: qla2xxx: Fix scheduling while atomic
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49156.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49156
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.2842
published_at 2026-04-09T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28424
published_at 2026-04-11T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2838
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28322
published_at 2026-04-13T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28334
published_at 2026-04-16T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28313
published_at 2026-04-18T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28267
published_at 2026-04-21T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28172
published_at 2026-04-24T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28311
published_at 2026-04-07T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28377
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49156
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347783
reference_id 2347783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347783
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49156
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nut-ha7g-dbbc
55
url VCID-9ujy-9ynv-nkar
vulnerability_id VCID-9ujy-9ynv-nkar
summary kernel: netfilter: conntrack: re-fetch conntrack after insertion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49561.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49561.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49561
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16498
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16483
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16444
published_at 2026-04-12T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-13T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16323
published_at 2026-04-16T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16344
published_at 2026-04-18T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16379
published_at 2026-04-21T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16273
published_at 2026-04-24T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16352
published_at 2026-04-07T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16439
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49561
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49561
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348159
reference_id 2348159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348159
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49561
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ujy-9ynv-nkar
56
url VCID-a6c8-sxhf-auek
vulnerability_id VCID-a6c8-sxhf-auek
summary kernel: fanotify misuses fd_install() which could lead to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1998.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1998.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1998
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-01T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31844
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31888
published_at 2026-04-04T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31707
published_at 2026-04-07T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31758
published_at 2026-04-08T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31788
published_at 2026-04-09T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31791
published_at 2026-04-11T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31751
published_at 2026-04-12T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31716
published_at 2026-04-13T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31748
published_at 2026-04-16T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31726
published_at 2026-04-18T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31694
published_at 2026-04-21T12:55:00Z
12
value 0.00125
scoring_system epss
scoring_elements 0.31522
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1998
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1998
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2052312
reference_id 2052312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2052312
5
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-1998
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6c8-sxhf-auek
57
url VCID-abus-pmpv-ayca
vulnerability_id VCID-abus-pmpv-ayca
summary kernel: iwlwifi: mvm: check debugfs_dir ptr before use
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48918.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48918
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07861
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.0791
published_at 2026-04-24T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07899
published_at 2026-04-13T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07814
published_at 2026-04-16T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.07797
published_at 2026-04-18T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07952
published_at 2026-04-21T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07909
published_at 2026-04-04T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07862
published_at 2026-04-07T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07921
published_at 2026-04-08T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07941
published_at 2026-04-09T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.07929
published_at 2026-04-11T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.07913
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48918
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307171
reference_id 2307171
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307171
4
reference_url https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c
reference_id 5a6248c0a22352f09ea041665d3bd3e18f6f872c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:38Z/
url https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c
5
reference_url https://git.kernel.org/stable/c/7de1ed755e1ace30d97a724bad32452ed86b653b
reference_id 7de1ed755e1ace30d97a724bad32452ed86b653b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:38Z/
url https://git.kernel.org/stable/c/7de1ed755e1ace30d97a724bad32452ed86b653b
6
reference_url https://git.kernel.org/stable/c/fe51975ff13831e794e1bcd0039b305dcad3d7ba
reference_id fe51975ff13831e794e1bcd0039b305dcad3d7ba
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:38Z/
url https://git.kernel.org/stable/c/fe51975ff13831e794e1bcd0039b305dcad3d7ba
7
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48918
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abus-pmpv-ayca
58
url VCID-ac81-f1pp-3keh
vulnerability_id VCID-ac81-f1pp-3keh
summary kernel: scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50030.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50030.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50030
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07129
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07204
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07183
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07237
published_at 2026-04-13T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07263
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.0726
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07247
published_at 2026-04-12T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21171
published_at 2026-04-24T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21324
published_at 2026-04-16T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21332
published_at 2026-04-18T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21307
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50030
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50030
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373453
reference_id 2373453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373453
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2024:4447
reference_id RHSA-2024:4447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4447
fixed_packages
aliases CVE-2022-50030
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac81-f1pp-3keh
59
url VCID-adpr-958r-eke7
vulnerability_id VCID-adpr-958r-eke7
summary kernel: race condition in snd_pcm_hw_free leading to use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1048.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1048
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02647
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.0281
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02718
published_at 2026-04-12T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02715
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02696
published_at 2026-04-16T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02706
published_at 2026-04-18T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.0282
published_at 2026-04-21T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02719
published_at 2026-04-02T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02734
published_at 2026-04-04T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02741
published_at 2026-04-07T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02744
published_at 2026-04-08T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02764
published_at 2026-04-09T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02735
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1048
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066706
reference_id 2066706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2066706
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
49
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
50
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
51
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
52
reference_url https://access.redhat.com/errata/RHSA-2024:4107
reference_id RHSA-2024:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4107
53
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
54
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
55
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
56
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
57
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
58
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
59
reference_url https://usn.ubuntu.com/5856-1/
reference_id USN-5856-1
reference_type
scores
url https://usn.ubuntu.com/5856-1/
fixed_packages
aliases CVE-2022-1048
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-adpr-958r-eke7
60
url VCID-atz3-c1m5-eqa2
vulnerability_id VCID-atz3-c1m5-eqa2
summary kernel: dm thin: fix use-after-free crash in dm_sm_register_threshold_callback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50092.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50092
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06275
published_at 2026-04-07T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06321
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06361
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06353
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06298
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06348
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-24T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50092
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50092
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373527
reference_id 2373527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373527
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50092
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atz3-c1m5-eqa2
61
url VCID-b7qz-uybn-tkcf
vulnerability_id VCID-b7qz-uybn-tkcf
summary kernel: sched/fair: Fix fault in reweight_entity
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48921.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48921.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48921
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05742
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05954
published_at 2026-04-24T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05811
published_at 2026-04-12T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05805
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05768
published_at 2026-04-16T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05775
published_at 2026-04-18T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.05921
published_at 2026-04-21T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05783
published_at 2026-04-04T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05778
published_at 2026-04-07T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05817
published_at 2026-04-08T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05842
published_at 2026-04-09T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.0582
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48921
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/13765de8148f71fa795e0a6607de37c49ea5915a
reference_id 13765de8148f71fa795e0a6607de37c49ea5915a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:28Z/
url https://git.kernel.org/stable/c/13765de8148f71fa795e0a6607de37c49ea5915a
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307174
reference_id 2307174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307174
6
reference_url https://git.kernel.org/stable/c/589a954daab5e18399860b6c8ffaeaf79844eb20
reference_id 589a954daab5e18399860b6c8ffaeaf79844eb20
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:28Z/
url https://git.kernel.org/stable/c/589a954daab5e18399860b6c8ffaeaf79844eb20
7
reference_url https://git.kernel.org/stable/c/8f317cd888059c59e2fa924bf4b0957cfa53f78e
reference_id 8f317cd888059c59e2fa924bf4b0957cfa53f78e
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:28Z/
url https://git.kernel.org/stable/c/8f317cd888059c59e2fa924bf4b0957cfa53f78e
8
reference_url https://git.kernel.org/stable/c/e0bcd6b5779352aed88f2e538a82a39f1a7715bb
reference_id e0bcd6b5779352aed88f2e538a82a39f1a7715bb
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:28Z/
url https://git.kernel.org/stable/c/e0bcd6b5779352aed88f2e538a82a39f1a7715bb
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48921
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7qz-uybn-tkcf
62
url VCID-bdpj-gk16-a3dz
vulnerability_id VCID-bdpj-gk16-a3dz
summary kernel: net/packet: slab-out-of-bounds access in packet_recvmsg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20368
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16153
published_at 2026-04-24T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16204
published_at 2026-04-16T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16223
published_at 2026-04-18T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16261
published_at 2026-04-21T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21147
published_at 2026-04-04T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20941
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21019
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20974
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2092
published_at 2026-04-13T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20942
published_at 2026-04-01T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20861
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21093
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123695
reference_id 2123695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123695
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:0930
reference_id RHSA-2024:0930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0930
10
reference_url https://usn.ubuntu.com/5580-1/
reference_id USN-5580-1
reference_type
scores
url https://usn.ubuntu.com/5580-1/
11
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2022-20368
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdpj-gk16-a3dz
63
url VCID-bjfy-hvff-dqfy
vulnerability_id VCID-bjfy-hvff-dqfy
summary kernel: ibmvnic: free reset-work-item when flushing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48905.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48905.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48905
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05869
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06085
published_at 2026-04-24T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05972
published_at 2026-04-09T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05953
published_at 2026-04-11T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05944
published_at 2026-04-12T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.05935
published_at 2026-04-13T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.059
published_at 2026-04-16T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.0591
published_at 2026-04-18T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.06062
published_at 2026-04-21T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05902
published_at 2026-04-04T12:55:00Z
10
value 0.00022
scoring_system epss
scoring_elements 0.05895
published_at 2026-04-07T12:55:00Z
11
value 0.00022
scoring_system epss
scoring_elements 0.05933
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48905
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307158
reference_id 2307158
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307158
5
reference_url https://git.kernel.org/stable/c/39738a2346b270e8f72f88d8856de2c167bd2899
reference_id 39738a2346b270e8f72f88d8856de2c167bd2899
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:34:20Z/
url https://git.kernel.org/stable/c/39738a2346b270e8f72f88d8856de2c167bd2899
6
reference_url https://git.kernel.org/stable/c/4c26745e4576cec224092e6cc12e37829333b183
reference_id 4c26745e4576cec224092e6cc12e37829333b183
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:34:20Z/
url https://git.kernel.org/stable/c/4c26745e4576cec224092e6cc12e37829333b183
7
reference_url https://git.kernel.org/stable/c/58b07100c20e95c78b8cb4d6d28ca53eb9ef81f2
reference_id 58b07100c20e95c78b8cb4d6d28ca53eb9ef81f2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:34:20Z/
url https://git.kernel.org/stable/c/58b07100c20e95c78b8cb4d6d28ca53eb9ef81f2
8
reference_url https://git.kernel.org/stable/c/6acbc8875282d3ca8a73fa93cd7a9b166de5019c
reference_id 6acbc8875282d3ca8a73fa93cd7a9b166de5019c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:34:20Z/
url https://git.kernel.org/stable/c/6acbc8875282d3ca8a73fa93cd7a9b166de5019c
9
reference_url https://git.kernel.org/stable/c/786576c03b313a9ff6585458aa0dfd039d897f51
reference_id 786576c03b313a9ff6585458aa0dfd039d897f51
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:34:20Z/
url https://git.kernel.org/stable/c/786576c03b313a9ff6585458aa0dfd039d897f51
10
reference_url https://git.kernel.org/stable/c/8d0657f39f487d904fca713e0bc39c2707382553
reference_id 8d0657f39f487d904fca713e0bc39c2707382553
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:34:20Z/
url https://git.kernel.org/stable/c/8d0657f39f487d904fca713e0bc39c2707382553
11
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
12
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48905
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjfy-hvff-dqfy
64
url VCID-bp6k-v3c5-gudy
vulnerability_id VCID-bp6k-v3c5-gudy
summary kernel: LoadPin bypass via dm-verity table reload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
reference_id
reference_type
scores
0
value 4e-05
scoring_system epss
scoring_elements 0.00202
published_at 2026-04-24T12:55:00Z
1
value 4e-05
scoring_system epss
scoring_elements 0.00194
published_at 2026-04-07T12:55:00Z
2
value 4e-05
scoring_system epss
scoring_elements 0.00197
published_at 2026-04-18T12:55:00Z
3
value 4e-05
scoring_system epss
scoring_elements 0.00193
published_at 2026-04-09T12:55:00Z
4
value 4e-05
scoring_system epss
scoring_elements 0.00195
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
reference_id 2177862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2177862
5
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
6
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
7
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
8
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
9
reference_url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
reference_id GHSA-6vq3-w69p-w63m
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
10
reference_url https://security.netapp.com/advisory/ntap-20230214-0005/
reference_id ntap-20230214-0005
reference_type
scores
0
value 6.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-21T13:39:52Z/
url https://security.netapp.com/advisory/ntap-20230214-0005/
11
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
15
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
16
reference_url https://usn.ubuntu.com/5594-1/
reference_id USN-5594-1
reference_type
scores
url https://usn.ubuntu.com/5594-1/
17
reference_url https://usn.ubuntu.com/5599-1/
reference_id USN-5599-1
reference_type
scores
url https://usn.ubuntu.com/5599-1/
18
reference_url https://usn.ubuntu.com/5602-1/
reference_id USN-5602-1
reference_type
scores
url https://usn.ubuntu.com/5602-1/
19
reference_url https://usn.ubuntu.com/5616-1/
reference_id USN-5616-1
reference_type
scores
url https://usn.ubuntu.com/5616-1/
20
reference_url https://usn.ubuntu.com/5622-1/
reference_id USN-5622-1
reference_type
scores
url https://usn.ubuntu.com/5622-1/
21
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
22
reference_url https://usn.ubuntu.com/5630-1/
reference_id USN-5630-1
reference_type
scores
url https://usn.ubuntu.com/5630-1/
23
reference_url https://usn.ubuntu.com/5639-1/
reference_id USN-5639-1
reference_type
scores
url https://usn.ubuntu.com/5639-1/
24
reference_url https://usn.ubuntu.com/5647-1/
reference_id USN-5647-1
reference_type
scores
url https://usn.ubuntu.com/5647-1/
25
reference_url https://usn.ubuntu.com/5654-1/
reference_id USN-5654-1
reference_type
scores
url https://usn.ubuntu.com/5654-1/
26
reference_url https://usn.ubuntu.com/5660-1/
reference_id USN-5660-1
reference_type
scores
url https://usn.ubuntu.com/5660-1/
27
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
28
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
29
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-2503
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bp6k-v3c5-gudy
65
url VCID-byxa-eqjd-8yb2
vulnerability_id VCID-byxa-eqjd-8yb2
summary kernel: use after free in SUNRPC subsystem
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28893.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28893
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07986
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08033
published_at 2026-04-04T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07992
published_at 2026-04-07T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08053
published_at 2026-04-08T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08077
published_at 2026-04-09T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08067
published_at 2026-04-11T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-12T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08029
published_at 2026-04-24T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07932
published_at 2026-04-16T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07918
published_at 2026-04-18T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08075
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28893
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2074208
reference_id 2074208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2074208
17
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
18
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
19
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
20
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
21
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
22
reference_url https://usn.ubuntu.com/5544-1/
reference_id USN-5544-1
reference_type
scores
url https://usn.ubuntu.com/5544-1/
23
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
24
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
25
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
26
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
fixed_packages
aliases CVE-2022-28893
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byxa-eqjd-8yb2
66
url VCID-c1cc-6p4r-13d8
vulnerability_id VCID-c1cc-6p4r-13d8
summary kernel: cifs: fix handlecache and multiuser
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49281.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49281
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02111
published_at 2026-04-24T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02049
published_at 2026-04-16T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02062
published_at 2026-04-18T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-21T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02099
published_at 2026-04-08T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02117
published_at 2026-04-09T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02094
published_at 2026-04-11T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02079
published_at 2026-04-12T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02074
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-02T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08319
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49281
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347860
reference_id 2347860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347860
4
reference_url https://access.redhat.com/errata/RHSA-2022:7318
reference_id RHSA-2022:7318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7318
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49281
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c1cc-6p4r-13d8
67
url VCID-cdxu-3fm4-rkdr
vulnerability_id VCID-cdxu-3fm4-rkdr
summary kernel: mac80211: fix potential double free on mesh join
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49290.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49290
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03597
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03552
published_at 2026-04-07T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03553
published_at 2026-04-08T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03575
published_at 2026-04-09T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03531
published_at 2026-04-11T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03502
published_at 2026-04-12T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03477
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03451
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03463
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03589
published_at 2026-04-21T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07515
published_at 2026-04-02T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07555
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/12e407a8ef17623823fd0c066fbd7f103953d28d
reference_id 12e407a8ef17623823fd0c066fbd7f103953d28d
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/12e407a8ef17623823fd0c066fbd7f103953d28d
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347727
reference_id 2347727
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347727
6
reference_url https://git.kernel.org/stable/c/273ebddc5fda2967492cb0b6cdd7d81cfb821b76
reference_id 273ebddc5fda2967492cb0b6cdd7d81cfb821b76
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/273ebddc5fda2967492cb0b6cdd7d81cfb821b76
7
reference_url https://git.kernel.org/stable/c/3bbd0000d012f92aec423b224784fbf0f7bf40f8
reference_id 3bbd0000d012f92aec423b224784fbf0f7bf40f8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/3bbd0000d012f92aec423b224784fbf0f7bf40f8
8
reference_url https://git.kernel.org/stable/c/46bb87d40683337757a2f902fcd4244b32bb4e86
reference_id 46bb87d40683337757a2f902fcd4244b32bb4e86
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/46bb87d40683337757a2f902fcd4244b32bb4e86
9
reference_url https://git.kernel.org/stable/c/4a2d4496e15ea5bb5c8e83b94ca8ca7fb045e7d3
reference_id 4a2d4496e15ea5bb5c8e83b94ca8ca7fb045e7d3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/4a2d4496e15ea5bb5c8e83b94ca8ca7fb045e7d3
10
reference_url https://git.kernel.org/stable/c/582d8c60c0c053684f7138875e8150d5749ffc17
reference_id 582d8c60c0c053684f7138875e8150d5749ffc17
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/582d8c60c0c053684f7138875e8150d5749ffc17
11
reference_url https://git.kernel.org/stable/c/5d3ff9542a40ce034416bca03864709540a36016
reference_id 5d3ff9542a40ce034416bca03864709540a36016
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/5d3ff9542a40ce034416bca03864709540a36016
12
reference_url https://git.kernel.org/stable/c/615716af8644813355e014314a0bc1e961250f5a
reference_id 615716af8644813355e014314a0bc1e961250f5a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/615716af8644813355e014314a0bc1e961250f5a
13
reference_url https://git.kernel.org/stable/c/c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186
reference_id c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-01T19:45:11Z/
url https://git.kernel.org/stable/c/c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
16
reference_url https://access.redhat.com/errata/RHSA-2026:1442
reference_id RHSA-2026:1442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1442
17
reference_url https://access.redhat.com/errata/RHSA-2026:1494
reference_id RHSA-2026:1494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1494
18
reference_url https://access.redhat.com/errata/RHSA-2026:1495
reference_id RHSA-2026:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1495
19
reference_url https://access.redhat.com/errata/RHSA-2026:1886
reference_id RHSA-2026:1886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1886
fixed_packages
aliases CVE-2022-49290
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cdxu-3fm4-rkdr
68
url VCID-ce4d-arhp-2fh7
vulnerability_id VCID-ce4d-arhp-2fh7
summary kernel: use-after-free vulnerability in function sco_sock_sendmsg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3640.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3640
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01659
published_at 2026-04-01T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01768
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01685
published_at 2026-04-12T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01684
published_at 2026-04-13T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01674
published_at 2026-04-16T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01677
published_at 2026-04-18T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01757
published_at 2026-04-21T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01692
published_at 2026-04-02T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01701
published_at 2026-04-04T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01699
published_at 2026-04-07T12:55:00Z
10
value 0.00012
scoring_system epss
scoring_elements 0.01702
published_at 2026-04-08T12:55:00Z
11
value 0.00012
scoring_system epss
scoring_elements 0.0171
published_at 2026-04-09T12:55:00Z
12
value 0.00012
scoring_system epss
scoring_elements 0.01694
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3640
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
53
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1980646
reference_id 1980646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1980646
55
reference_url https://security.archlinux.org/AVG-2568
reference_id AVG-2568
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2568
56
reference_url https://security.archlinux.org/AVG-2570
reference_id AVG-2570
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2570
57
reference_url https://security.archlinux.org/AVG-2571
reference_id AVG-2571
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2571
58
reference_url https://security.archlinux.org/AVG-2588
reference_id AVG-2588
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2588
59
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
60
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
61
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
62
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
63
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
64
reference_url https://usn.ubuntu.com/5265-1/
reference_id USN-5265-1
reference_type
scores
url https://usn.ubuntu.com/5265-1/
65
reference_url https://usn.ubuntu.com/5267-1/
reference_id USN-5267-1
reference_type
scores
url https://usn.ubuntu.com/5267-1/
66
reference_url https://usn.ubuntu.com/5267-3/
reference_id USN-5267-3
reference_type
scores
url https://usn.ubuntu.com/5267-3/
67
reference_url https://usn.ubuntu.com/5268-1/
reference_id USN-5268-1
reference_type
scores
url https://usn.ubuntu.com/5268-1/
fixed_packages
aliases CVE-2021-3640
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ce4d-arhp-2fh7
69
url VCID-cjvg-hahg-rygg
vulnerability_id VCID-cjvg-hahg-rygg
summary kernel: ext4: fix bug_on ext4_mb_use_inode_pa
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49708.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49708.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49708
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07121
published_at 2026-04-24T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-13T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-18T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07156
published_at 2026-04-21T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07039
published_at 2026-04-16T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07094
published_at 2026-04-08T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07125
published_at 2026-04-09T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07124
published_at 2026-04-11T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07113
published_at 2026-04-12T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-02T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08676
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49708
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49708
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347684
reference_id 2347684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347684
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49708
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjvg-hahg-rygg
70
url VCID-cr5s-una3-gyg4
vulnerability_id VCID-cr5s-una3-gyg4
summary kernel: nfs_atomic_open() returns uninitialized data instead of ENOTDIR
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24448.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24448
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03773
published_at 2026-04-12T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03786
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03801
published_at 2026-04-07T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03805
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03829
published_at 2026-04-09T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03792
published_at 2026-04-11T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03745
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03726
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03737
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.0386
published_at 2026-04-21T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03866
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2051444
reference_id 2051444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2051444
57
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
58
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
59
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
60
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
61
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
62
reference_url https://usn.ubuntu.com/5302-1/
reference_id USN-5302-1
reference_type
scores
url https://usn.ubuntu.com/5302-1/
63
reference_url https://usn.ubuntu.com/5383-1/
reference_id USN-5383-1
reference_type
scores
url https://usn.ubuntu.com/5383-1/
64
reference_url https://usn.ubuntu.com/5384-1/
reference_id USN-5384-1
reference_type
scores
url https://usn.ubuntu.com/5384-1/
65
reference_url https://usn.ubuntu.com/5385-1/
reference_id USN-5385-1
reference_type
scores
url https://usn.ubuntu.com/5385-1/
66
reference_url https://usn.ubuntu.com/7148-1/
reference_id USN-7148-1
reference_type
scores
url https://usn.ubuntu.com/7148-1/
fixed_packages
aliases CVE-2022-24448
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cr5s-una3-gyg4
71
url VCID-csy7-esn4-u3gq
vulnerability_id VCID-csy7-esn4-u3gq
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
reference_id
reference_type
scores
0
value 0.00452
scoring_system epss
scoring_elements 0.63685
published_at 2026-04-02T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63755
published_at 2026-04-24T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-04T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63671
published_at 2026-04-07T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-08T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6374
published_at 2026-04-12T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-11T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63706
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63741
published_at 2026-04-16T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63751
published_at 2026-04-18T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63739
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
reference_id 2090237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
aliases CVE-2022-21123
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq
72
url VCID-cydx-ykad-7ke5
vulnerability_id VCID-cydx-ykad-7ke5
summary kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3108.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3108
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02106
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02109
published_at 2026-04-08T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02113
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02089
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02443
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.0245
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02542
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02555
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3108
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153052
reference_id 2153052
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:17:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2153052
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
reference_id ?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:17:37Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
6
reference_url https://access.redhat.com/errata/RHSA-2022:1975
reference_id RHSA-2022:1975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1975
7
reference_url https://access.redhat.com/errata/RHSA-2022:1988
reference_id RHSA-2022:1988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1988
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://usn.ubuntu.com/6027-1/
reference_id USN-6027-1
reference_type
scores
url https://usn.ubuntu.com/6027-1/
11
reference_url https://usn.ubuntu.com/6093-1/
reference_id USN-6093-1
reference_type
scores
url https://usn.ubuntu.com/6093-1/
12
reference_url https://usn.ubuntu.com/6222-1/
reference_id USN-6222-1
reference_type
scores
url https://usn.ubuntu.com/6222-1/
13
reference_url https://usn.ubuntu.com/6256-1/
reference_id USN-6256-1
reference_type
scores
url https://usn.ubuntu.com/6256-1/
fixed_packages
aliases CVE-2022-3108
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cydx-ykad-7ke5
73
url VCID-d1uc-apk8-qked
vulnerability_id VCID-d1uc-apk8-qked
summary kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1280.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1280
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05438
published_at 2026-04-24T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05245
published_at 2026-04-16T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05247
published_at 2026-04-18T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05399
published_at 2026-04-21T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05714
published_at 2026-04-04T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05747
published_at 2026-04-08T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05773
published_at 2026-04-09T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05751
published_at 2026-04-11T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05743
published_at 2026-04-12T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05738
published_at 2026-04-13T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.0564
published_at 2026-04-01T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05707
published_at 2026-04-07T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05674
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2071022
reference_id 2071022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2071022
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-1280
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1uc-apk8-qked
74
url VCID-d7ss-gn8d-93fj
vulnerability_id VCID-d7ss-gn8d-93fj
summary kernel: scsi: lpfc: Address NULL pointer dereference after starget_to_rport()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49332.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49332.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49332
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11337
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11394
published_at 2026-04-04T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22845
published_at 2026-04-09T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22866
published_at 2026-04-11T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22829
published_at 2026-04-12T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22772
published_at 2026-04-13T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22787
published_at 2026-04-16T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.2278
published_at 2026-04-18T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22739
published_at 2026-04-21T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22578
published_at 2026-04-24T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22718
published_at 2026-04-07T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22793
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49332
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347742
reference_id 2347742
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347742
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49332
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d7ss-gn8d-93fj
75
url VCID-dkbr-f7e9-qyfa
vulnerability_id VCID-dkbr-f7e9-qyfa
summary kernel: irqchip/gic-v3-its: Fix potential VPE leak on error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47373.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47373
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-07T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00597
published_at 2026-04-02T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00619
published_at 2026-04-24T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00591
published_at 2026-04-08T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00584
published_at 2026-04-11T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.0058
published_at 2026-04-12T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00581
published_at 2026-04-18T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00576
published_at 2026-04-16T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00621
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282373
reference_id 2282373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282373
5
reference_url https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd
reference_id 280bef512933b2dda01d681d8cbe499b98fc5bdd
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:38:26Z/
url https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd
6
reference_url https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b
reference_id 42d3711c23781045e7a5cd28536c774b9a66d20b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:38:26Z/
url https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b
7
reference_url https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7
reference_id 568662e37f927e3dc3e475f3ff7cf4ab7719c5e7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:38:26Z/
url https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7
8
reference_url https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0
reference_id 5701e8bff314c155e7afdc467b1e0389d86853d0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:38:26Z/
url https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0
9
reference_url https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b
reference_id 7d39992d45acd6f2d6b2f62389c55b61fb3d486b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:38:26Z/
url https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b
10
reference_url https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84
reference_id e0c1c2e5da19685a20557a50f10c6aa4fa26aa84
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:38:26Z/
url https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
12
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
13
reference_url https://access.redhat.com/errata/RHSA-2024:5102
reference_id RHSA-2024:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5102
fixed_packages
aliases CVE-2021-47373
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkbr-f7e9-qyfa
76
url VCID-dqm4-h22h-fqdm
vulnerability_id VCID-dqm4-h22h-fqdm
summary kernel: ext4: fix bug_on in __es_tree_search
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49409.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49409.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49409
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08143
published_at 2026-04-24T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08045
published_at 2026-04-16T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.0803
published_at 2026-04-18T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08189
published_at 2026-04-21T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08099
published_at 2026-04-07T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08159
published_at 2026-04-08T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08182
published_at 2026-04-09T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08176
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08156
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08139
published_at 2026-04-13T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-02T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08676
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49409
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49409
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49409
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348330
reference_id 2348330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348330
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49409
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqm4-h22h-fqdm
77
url VCID-dxzp-2kau-bkfw
vulnerability_id VCID-dxzp-2kau-bkfw
summary kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49671.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49671.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49671
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10722
published_at 2026-04-24T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10675
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10751
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10808
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10822
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10791
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10766
published_at 2026-04-13T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10627
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10643
published_at 2026-04-18T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10768
published_at 2026-04-21T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49671
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49671
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348040
reference_id 2348040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348040
5
reference_url https://git.kernel.org/stable/c/2990f223ffa7bb25422956b9f79f9176a5b38346
reference_id 2990f223ffa7bb25422956b9f79f9176a5b38346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/2990f223ffa7bb25422956b9f79f9176a5b38346
6
reference_url https://git.kernel.org/stable/c/2febf09a8a8ae4accf908f043f1bab1421056568
reference_id 2febf09a8a8ae4accf908f043f1bab1421056568
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/2febf09a8a8ae4accf908f043f1bab1421056568
7
reference_url https://git.kernel.org/stable/c/889000874c1204e47c7f2a4945db262a47e7efc9
reference_id 889000874c1204e47c7f2a4945db262a47e7efc9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/889000874c1204e47c7f2a4945db262a47e7efc9
8
reference_url https://git.kernel.org/stable/c/b0cab8b517aeaf2592c3479294f934209c41a26f
reference_id b0cab8b517aeaf2592c3479294f934209c41a26f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:33:18Z/
url https://git.kernel.org/stable/c/b0cab8b517aeaf2592c3479294f934209c41a26f
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49671
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxzp-2kau-bkfw
78
url VCID-dzcg-vtsb-1kh6
vulnerability_id VCID-dzcg-vtsb-1kh6
summary kernel: dma-buf/dma-resv: Stop leaking on krealloc() failure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53181.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53181
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01826
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01838
published_at 2026-04-04T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.0184
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01843
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01857
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02281
published_at 2026-04-21T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02261
published_at 2026-04-24T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02215
published_at 2026-04-11T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02204
published_at 2026-04-12T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02203
published_at 2026-04-13T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02186
published_at 2026-04-16T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53181
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2395369
reference_id 2395369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2395369
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2024:2394
reference_id RHSA-2024:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2394
fixed_packages
aliases CVE-2023-53181
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzcg-vtsb-1kh6
79
url VCID-e7x1-pktx-dqc9
vulnerability_id VCID-e7x1-pktx-dqc9
summary kernel: wireguard: socket: free skb in send6 when ipv6 is disabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49153.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49153
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.23837
published_at 2026-04-24T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.23947
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24014
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.2406
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24077
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24034
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.23978
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.23988
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23976
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.23959
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/096f9d35cac0a0c95ffafc00db84786b665a4837
reference_id 096f9d35cac0a0c95ffafc00db84786b665a4837
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:47:43Z/
url https://git.kernel.org/stable/c/096f9d35cac0a0c95ffafc00db84786b665a4837
5
reference_url https://git.kernel.org/stable/c/0b19bcb753dbfb74710d12bb2761ec5ed706c726
reference_id 0b19bcb753dbfb74710d12bb2761ec5ed706c726
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:47:43Z/
url https://git.kernel.org/stable/c/0b19bcb753dbfb74710d12bb2761ec5ed706c726
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348284
reference_id 2348284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348284
7
reference_url https://git.kernel.org/stable/c/402991a9771587acc2947cf6c4d689c5397f2258
reference_id 402991a9771587acc2947cf6c4d689c5397f2258
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:47:43Z/
url https://git.kernel.org/stable/c/402991a9771587acc2947cf6c4d689c5397f2258
8
reference_url https://git.kernel.org/stable/c/bbbf962d9460194993ee1943a793a0a0af4a7fbf
reference_id bbbf962d9460194993ee1943a793a0a0af4a7fbf
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:47:43Z/
url https://git.kernel.org/stable/c/bbbf962d9460194993ee1943a793a0a0af4a7fbf
9
reference_url https://git.kernel.org/stable/c/ebcc492f4ba14bae54b898f1016a37b4282558d1
reference_id ebcc492f4ba14bae54b898f1016a37b4282558d1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:47:43Z/
url https://git.kernel.org/stable/c/ebcc492f4ba14bae54b898f1016a37b4282558d1
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49153
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7x1-pktx-dqc9
80
url VCID-ec58-aejx-2kce
vulnerability_id VCID-ec58-aejx-2kce
summary kernel: mptcp: fix race on unaccepted mptcp sockets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49669.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49669
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12166
published_at 2026-04-04T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.1212
published_at 2026-04-02T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.33813
published_at 2026-04-24T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34222
published_at 2026-04-12T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34198
published_at 2026-04-13T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34232
published_at 2026-04-16T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34221
published_at 2026-04-18T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34186
published_at 2026-04-21T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.3419
published_at 2026-04-07T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34233
published_at 2026-04-08T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.34262
published_at 2026-04-09T12:55:00Z
11
value 0.0014
scoring_system epss
scoring_elements 0.34263
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49669
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348086
reference_id 2348086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348086
4
reference_url https://git.kernel.org/stable/c/6aeed9045071f2252ff4e98fc13d1e304f33e5b0
reference_id 6aeed9045071f2252ff4e98fc13d1e304f33e5b0
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:23Z/
url https://git.kernel.org/stable/c/6aeed9045071f2252ff4e98fc13d1e304f33e5b0
5
reference_url https://git.kernel.org/stable/c/a8a3e95c74e48c2c9b07b81fafda9122993f2e12
reference_id a8a3e95c74e48c2c9b07b81fafda9122993f2e12
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:23Z/
url https://git.kernel.org/stable/c/a8a3e95c74e48c2c9b07b81fafda9122993f2e12
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49669
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ec58-aejx-2kce
81
url VCID-ep2r-37u6-a7ht
vulnerability_id VCID-ep2r-37u6-a7ht
summary kernel: veth: ensure skb entering GRO are not cloned.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47099.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47099
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02056
published_at 2026-04-01T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-02T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.0215
published_at 2026-04-24T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02109
published_at 2026-04-12T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02105
published_at 2026-04-13T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.0208
published_at 2026-04-16T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02094
published_at 2026-04-18T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02181
published_at 2026-04-21T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.02133
published_at 2026-04-04T12:55:00Z
9
value 0.00013
scoring_system epss
scoring_elements 0.02129
published_at 2026-04-08T12:55:00Z
10
value 0.00013
scoring_system epss
scoring_elements 0.02147
published_at 2026-04-09T12:55:00Z
11
value 0.00013
scoring_system epss
scoring_elements 0.02124
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47099
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2267919
reference_id 2267919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2267919
4
reference_url https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
reference_id 9695b7de5b4760ed22132aca919570c0190cb0ce
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:24:44Z/
url https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
5
reference_url https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
reference_id d2269ae48598e05b59ec9ea9e6e44fd33941130d
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-12T14:24:44Z/
url https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
fixed_packages
aliases CVE-2021-47099
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep2r-37u6-a7ht
82
url VCID-er28-r5n3-eken
vulnerability_id VCID-er28-r5n3-eken
summary kernel: netfilter: fix use-after-free in __nf_register_net_hook()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48912.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48912
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06216
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06418
published_at 2026-04-24T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0627
published_at 2026-04-08T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06311
published_at 2026-04-09T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06305
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.063
published_at 2026-04-12T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06289
published_at 2026-04-13T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06246
published_at 2026-04-16T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-18T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06404
published_at 2026-04-21T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06247
published_at 2026-04-04T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06226
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48912
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
reference_id 05f7927b25d2635e87267ff6c79db79fb46cf313
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307165
reference_id 2307165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307165
6
reference_url https://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b
reference_id 49c24579cec41e32f13d57b337fd28fb208d4a5b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b
7
reference_url https://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0
reference_id 56763f12b0f02706576a088e85ef856deacc98a0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0
8
reference_url https://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72
reference_id 5a8076e98dde17224dd47283b894a8b1dbe1bc72
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72
9
reference_url https://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344
reference_id 8b0142c4143c1ca297dcf2c0cdd045d65dae2344
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344
10
reference_url https://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979
reference_id bd61f192a339b1095dfd6d56073a5265934c2979
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979
11
reference_url https://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954
reference_id bdd8fc1b826e6f23963f5bef3f7431c6188ec954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:57Z/
url https://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48912
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-er28-r5n3-eken
83
url VCID-etaa-zh6y-kqg7
vulnerability_id VCID-etaa-zh6y-kqg7
summary kernel: dm raid: fix KASAN warning in raid5_add_disks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49673.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49673.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49673
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11746
published_at 2026-04-24T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15143
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15231
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15282
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15252
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15213
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15149
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15062
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15071
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15122
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49673
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49673
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347792
reference_id 2347792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347792
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49673
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etaa-zh6y-kqg7
84
url VCID-ewej-5s1a-bbek
vulnerability_id VCID-ewej-5s1a-bbek
summary kernel: sock: redo the psock vs ULP protection check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49732.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49732
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02545
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02447
published_at 2026-04-16T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02454
published_at 2026-04-18T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02558
published_at 2026-04-21T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02469
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02472
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02493
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02464
published_at 2026-04-12T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02463
published_at 2026-04-13T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49732
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348409
reference_id 2348409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348409
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-49732
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ewej-5s1a-bbek
85
url VCID-eyf5-2y8d-33hp
vulnerability_id VCID-eyf5-2y8d-33hp
summary kernel: KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48765.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48765
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09471
published_at 2026-04-02T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09615
published_at 2026-04-24T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09524
published_at 2026-04-13T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09417
published_at 2026-04-16T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09419
published_at 2026-04-18T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09569
published_at 2026-04-21T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09519
published_at 2026-04-04T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09433
published_at 2026-04-07T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09507
published_at 2026-04-08T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09554
published_at 2026-04-09T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09568
published_at 2026-04-11T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09539
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293344
reference_id 2293344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293344
5
reference_url https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
reference_id 35fe7cfbab2e81f1afb23fc4212210b1de6d9633
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:12Z/
url https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
6
reference_url https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
reference_id 54b3439c8e70e0bcfea59aeef9dd98908cbbf655
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:12Z/
url https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
7
reference_url https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
reference_id ce55f63f6cea4cab8ae9212f73285648a5baa30d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:12Z/
url https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
8
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48765
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyf5-2y8d-33hp
86
url VCID-f4jq-3ezz-63b6
vulnerability_id VCID-f4jq-3ezz-63b6
summary kernel: net: openvswitch: fix leak of nested actions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49086.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49086
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01537
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01435
published_at 2026-04-12T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01436
published_at 2026-04-13T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01426
published_at 2026-04-16T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.0144
published_at 2026-04-18T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01528
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15608
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18511
published_at 2026-04-09T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-07T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18459
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347770
reference_id 2347770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347770
5
reference_url https://access.redhat.com/errata/RHSA-2022:5626
reference_id RHSA-2022:5626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5626
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
fixed_packages
aliases CVE-2022-49086
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4jq-3ezz-63b6
87
url VCID-f7p2-3cfh-3yh4
vulnerability_id VCID-f7p2-3cfh-3yh4
summary kernel: net: nexthop: fix null pointer dereference when IPv6 is not enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47572.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47572
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09461
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09471
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09615
published_at 2026-04-24T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09539
published_at 2026-04-12T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09524
published_at 2026-04-13T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09417
published_at 2026-04-16T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09419
published_at 2026-04-18T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09569
published_at 2026-04-21T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09519
published_at 2026-04-04T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09433
published_at 2026-04-07T12:55:00Z
10
value 0.00033
scoring_system epss
scoring_elements 0.09507
published_at 2026-04-08T12:55:00Z
11
value 0.00033
scoring_system epss
scoring_elements 0.09554
published_at 2026-04-09T12:55:00Z
12
value 0.00033
scoring_system epss
scoring_elements 0.09568
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1c743127cc54b112b155f434756bd4b5fa565a99
reference_id 1c743127cc54b112b155f434756bd4b5fa565a99
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:07Z/
url https://git.kernel.org/stable/c/1c743127cc54b112b155f434756bd4b5fa565a99
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2283457
reference_id 2283457
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2283457
6
reference_url https://git.kernel.org/stable/c/39509d76a9a3d02f379d52cb4b1449469c56c0e0
reference_id 39509d76a9a3d02f379d52cb4b1449469c56c0e0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:07Z/
url https://git.kernel.org/stable/c/39509d76a9a3d02f379d52cb4b1449469c56c0e0
7
reference_url https://git.kernel.org/stable/c/7b6f44856da5ba0b1aa61403eb9fddd272156503
reference_id 7b6f44856da5ba0b1aa61403eb9fddd272156503
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:07Z/
url https://git.kernel.org/stable/c/7b6f44856da5ba0b1aa61403eb9fddd272156503
8
reference_url https://git.kernel.org/stable/c/b70ff391deeec35cdd8a05f5f63f5fe28bc4f225
reference_id b70ff391deeec35cdd8a05f5f63f5fe28bc4f225
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:35:07Z/
url https://git.kernel.org/stable/c/b70ff391deeec35cdd8a05f5f63f5fe28bc4f225
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47572
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7p2-3cfh-3yh4
88
url VCID-f9md-7hmr-qucr
vulnerability_id VCID-f9md-7hmr-qucr
summary kernel: smb2_ioctl_query_info NULL pointer dereference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0168.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0168.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0168
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.0439
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04631
published_at 2026-04-24T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04493
published_at 2026-04-12T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04475
published_at 2026-04-13T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04445
published_at 2026-04-16T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04454
published_at 2026-04-18T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04591
published_at 2026-04-21T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0443
published_at 2026-04-02T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04456
published_at 2026-04-04T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04468
published_at 2026-04-07T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04502
published_at 2026-04-08T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04517
published_at 2026-04-09T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04507
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0168
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
21
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2037386
reference_id 2037386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2037386
23
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
24
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
25
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
26
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
27
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
28
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
32
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
33
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
34
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
35
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
36
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
37
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
38
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2022-0168
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9md-7hmr-qucr
89
url VCID-fa6b-jmqw-3bf3
vulnerability_id VCID-fa6b-jmqw-3bf3
summary kernel: ptp: unregister virtual clocks when unregistering physical clock.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49229.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49229.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49229
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29262
published_at 2026-04-24T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29424
published_at 2026-04-18T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29379
published_at 2026-04-21T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29484
published_at 2026-04-12T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29525
published_at 2026-04-09T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29528
published_at 2026-04-11T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29432
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29452
published_at 2026-04-16T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34592
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49229
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348216
reference_id 2348216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348216
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49229
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fa6b-jmqw-3bf3
90
url VCID-fh8d-gpu9-13ap
vulnerability_id VCID-fh8d-gpu9-13ap
summary kernel: block, bfq: don't move oom_bfqq
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49179.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49179
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15501
published_at 2026-04-04T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15432
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16185
published_at 2026-04-24T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16276
published_at 2026-04-07T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16361
published_at 2026-04-08T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16419
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16402
published_at 2026-04-11T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16363
published_at 2026-04-12T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.163
published_at 2026-04-13T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16238
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16258
published_at 2026-04-18T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16294
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348174
reference_id 2348174
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348174
5
reference_url https://git.kernel.org/stable/c/7507ead1e9d42957c2340f2c4a0e9d00034e3366
reference_id 7507ead1e9d42957c2340f2c4a0e9d00034e3366
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:03Z/
url https://git.kernel.org/stable/c/7507ead1e9d42957c2340f2c4a0e9d00034e3366
6
reference_url https://git.kernel.org/stable/c/8410f70977734f21b8ed45c37e925d311dfda2e7
reference_id 8410f70977734f21b8ed45c37e925d311dfda2e7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:03Z/
url https://git.kernel.org/stable/c/8410f70977734f21b8ed45c37e925d311dfda2e7
7
reference_url https://git.kernel.org/stable/c/87fdfe8589d43e471dffb4c60f75eeb6f37afc4c
reference_id 87fdfe8589d43e471dffb4c60f75eeb6f37afc4c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:03Z/
url https://git.kernel.org/stable/c/87fdfe8589d43e471dffb4c60f75eeb6f37afc4c
8
reference_url https://git.kernel.org/stable/c/8f34dea99cd7761156a146a5258a67d045d862f7
reference_id 8f34dea99cd7761156a146a5258a67d045d862f7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:03Z/
url https://git.kernel.org/stable/c/8f34dea99cd7761156a146a5258a67d045d862f7
9
reference_url https://git.kernel.org/stable/c/c01fced8d38fbccc82787065229578006f28e020
reference_id c01fced8d38fbccc82787065229578006f28e020
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:03Z/
url https://git.kernel.org/stable/c/c01fced8d38fbccc82787065229578006f28e020
10
reference_url https://git.kernel.org/stable/c/c4f5a678add58a8a0e7ee5e038496b376ea6d205
reference_id c4f5a678add58a8a0e7ee5e038496b376ea6d205
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:03Z/
url https://git.kernel.org/stable/c/c4f5a678add58a8a0e7ee5e038496b376ea6d205
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
12
reference_url https://usn.ubuntu.com/7627-1/
reference_id USN-7627-1
reference_type
scores
url https://usn.ubuntu.com/7627-1/
13
reference_url https://usn.ubuntu.com/7627-2/
reference_id USN-7627-2
reference_type
scores
url https://usn.ubuntu.com/7627-2/
fixed_packages
aliases CVE-2022-49179
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fh8d-gpu9-13ap
91
url VCID-fkxh-mkuc-h7da
vulnerability_id VCID-fkxh-mkuc-h7da
summary kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48866.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48866
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08568
published_at 2026-04-02T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08623
published_at 2026-04-21T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08611
published_at 2026-04-12T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08598
published_at 2026-04-13T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08487
published_at 2026-04-16T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08474
published_at 2026-04-18T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08621
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08539
published_at 2026-04-07T12:55:00Z
8
value 0.0003
scoring_system epss
scoring_elements 0.08612
published_at 2026-04-08T12:55:00Z
9
value 0.0003
scoring_system epss
scoring_elements 0.08637
published_at 2026-04-09T12:55:00Z
10
value 0.0003
scoring_system epss
scoring_elements 0.08634
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48866
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2298640
reference_id 2298640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2298640
4
reference_url https://git.kernel.org/stable/c/3ffbe85cda7f523dad896bae08cecd8db8b555ab
reference_id 3ffbe85cda7f523dad896bae08cecd8db8b555ab
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:25:15Z/
url https://git.kernel.org/stable/c/3ffbe85cda7f523dad896bae08cecd8db8b555ab
5
reference_url https://git.kernel.org/stable/c/56185434e1e50acecee56d8f5850135009b87947
reference_id 56185434e1e50acecee56d8f5850135009b87947
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:25:15Z/
url https://git.kernel.org/stable/c/56185434e1e50acecee56d8f5850135009b87947
6
reference_url https://git.kernel.org/stable/c/fc3ef2e3297b3c0e2006b5d7b3d66965e3392036
reference_id fc3ef2e3297b3c0e2006b5d7b3d66965e3392036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:25:15Z/
url https://git.kernel.org/stable/c/fc3ef2e3297b3c0e2006b5d7b3d66965e3392036
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://access.redhat.com/errata/RHSA-2024:7000
reference_id RHSA-2024:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7000
9
reference_url https://access.redhat.com/errata/RHSA-2024:7001
reference_id RHSA-2024:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7001
fixed_packages
aliases CVE-2022-48866
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkxh-mkuc-h7da
92
url VCID-fndq-8n22-byes
vulnerability_id VCID-fndq-8n22-byes
summary kernel: nbd: fix io hung while disconnecting device
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49297.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49297.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49297
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01078
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01008
published_at 2026-04-16T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01017
published_at 2026-04-18T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01076
published_at 2026-04-21T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01032
published_at 2026-04-07T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01037
published_at 2026-04-08T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.01035
published_at 2026-04-09T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.0102
published_at 2026-04-11T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01015
published_at 2026-04-12T12:55:00Z
9
value 0.0001
scoring_system epss
scoring_elements 0.01014
published_at 2026-04-13T12:55:00Z
10
value 0.00028
scoring_system epss
scoring_elements 0.08046
published_at 2026-04-02T12:55:00Z
11
value 0.00028
scoring_system epss
scoring_elements 0.08089
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49297
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49297
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49297
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348157
reference_id 2348157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348157
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49297
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fndq-8n22-byes
93
url VCID-fpkj-sk3m-pqae
vulnerability_id VCID-fpkj-sk3m-pqae
summary kernel: Drivers: hv: vmbus: Fix potential crash on module unload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49098.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49098
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-11T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01127
published_at 2026-04-07T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01133
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1645
published_at 2026-04-04T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16388
published_at 2026-04-02T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00898
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-21T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00897
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-18T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.009
published_at 2026-04-13T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00957
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49098
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348148
reference_id 2348148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348148
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49098
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpkj-sk3m-pqae
94
url VCID-fz24-3kux-sucr
vulnerability_id VCID-fz24-3kux-sucr
summary kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48738.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48738
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02463
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02551
published_at 2026-04-24T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02475
published_at 2026-04-07T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02478
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02498
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02477
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02469
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02468
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02452
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02459
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02565
published_at 2026-04-21T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293321
reference_id 2293321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293321
5
reference_url https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d
reference_id 40f598698129b5ceaf31012f9501b775c7b6e57d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d
6
reference_url https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7
reference_id 586ef863c94354a7e00e5ae5ef01443d1dc99bc7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7
7
reference_url https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf
reference_id 65a61b1f56f5386486757930069fbdce94af08bf
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf
8
reference_url https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7
reference_id 68fd718724284788fc5f379e0b7cac541429ece7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7
9
reference_url https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
reference_id 817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
10
reference_url https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
reference_id 9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
11
reference_url https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a
reference_id a9394f21fba027147bf275b083c77955864c366a
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a
12
reference_url https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d
reference_id bb72d2dda85564c66d909108ea6903937a41679d
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:47Z/
url https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48738
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fz24-3kux-sucr
95
url VCID-g4vz-dgw6-dua2
vulnerability_id VCID-g4vz-dgw6-dua2
summary kernel: swiotlb information leak with DMA_FROM_DEVICE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0854.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0854.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0854
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04576
published_at 2026-04-01T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04637
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.0466
published_at 2026-04-04T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04673
published_at 2026-04-07T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04707
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04719
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04713
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04696
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04679
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05116
published_at 2026-04-24T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04929
published_at 2026-04-16T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.04939
published_at 2026-04-18T12:55:00Z
12
value 0.00019
scoring_system epss
scoring_elements 0.05086
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1786
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
45
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2058395
reference_id 2058395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2058395
47
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
48
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
49
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
50
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
51
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
52
reference_url https://usn.ubuntu.com/5381-1/
reference_id USN-5381-1
reference_type
scores
url https://usn.ubuntu.com/5381-1/
fixed_packages
aliases CVE-2022-0854
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4vz-dgw6-dua2
96
url VCID-g8j3-3ky8-h7av
vulnerability_id VCID-g8j3-3ky8-h7av
summary kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2153
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03579
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03593
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-24T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06171
published_at 2026-04-16T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06182
published_at 2026-04-18T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-21T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06657
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06563
published_at 2026-04-07T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06613
published_at 2026-04-08T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06648
published_at 2026-04-11T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06641
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
39
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2069736
reference_id 2069736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2069736
41
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
42
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
43
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
44
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
45
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
46
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
47
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
48
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
49
reference_url https://usn.ubuntu.com/5727-1/
reference_id USN-5727-1
reference_type
scores
url https://usn.ubuntu.com/5727-1/
50
reference_url https://usn.ubuntu.com/5727-2/
reference_id USN-5727-2
reference_type
scores
url https://usn.ubuntu.com/5727-2/
51
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
52
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
53
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
54
reference_url https://usn.ubuntu.com/5774-1/
reference_id USN-5774-1
reference_type
scores
url https://usn.ubuntu.com/5774-1/
fixed_packages
aliases CVE-2022-2153
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g8j3-3ky8-h7av
97
url VCID-gcuq-w2hp-xubb
vulnerability_id VCID-gcuq-w2hp-xubb
summary kernel: ath9k_htc: fix uninit value bugs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49235.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49235
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05785
published_at 2026-04-04T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05744
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07455
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0741
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07465
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07488
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07481
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07469
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07457
published_at 2026-04-13T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07381
published_at 2026-04-16T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07367
published_at 2026-04-18T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07495
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49235
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0b700f7d06492de34964b6f414120043364f8191
reference_id 0b700f7d06492de34964b6f414120043364f8191
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/0b700f7d06492de34964b6f414120043364f8191
5
reference_url https://git.kernel.org/stable/c/11f11ac281f0c0b363d2940204f28bae0422ed71
reference_id 11f11ac281f0c0b363d2940204f28bae0422ed71
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/11f11ac281f0c0b363d2940204f28bae0422ed71
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347667
reference_id 2347667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347667
7
reference_url https://git.kernel.org/stable/c/4d244b731188e0b63fc40a9d2dec72e9181fb37c
reference_id 4d244b731188e0b63fc40a9d2dec72e9181fb37c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/4d244b731188e0b63fc40a9d2dec72e9181fb37c
8
reference_url https://git.kernel.org/stable/c/5abf2b761b998063f5e2bae93fd4ab10e2a80f10
reference_id 5abf2b761b998063f5e2bae93fd4ab10e2a80f10
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/5abf2b761b998063f5e2bae93fd4ab10e2a80f10
9
reference_url https://git.kernel.org/stable/c/5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9
reference_id 5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9
10
reference_url https://git.kernel.org/stable/c/7da6169b6ebb75816b57be3beb829afa74f3b4b6
reference_id 7da6169b6ebb75816b57be3beb829afa74f3b4b6
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/7da6169b6ebb75816b57be3beb829afa74f3b4b6
11
reference_url https://git.kernel.org/stable/c/d1e0df1c57bd30871dd1c855742a7c346dbca853
reference_id d1e0df1c57bd30871dd1c855742a7c346dbca853
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/d1e0df1c57bd30871dd1c855742a7c346dbca853
12
reference_url https://git.kernel.org/stable/c/e352acdd378e9263cc4c6018e588f2dac7161d07
reference_id e352acdd378e9263cc4c6018e588f2dac7161d07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/e352acdd378e9263cc4c6018e588f2dac7161d07
13
reference_url https://git.kernel.org/stable/c/ee4222052a76559c20e821bc3519cefb58b6d3e9
reference_id ee4222052a76559c20e821bc3519cefb58b6d3e9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:46:00Z/
url https://git.kernel.org/stable/c/ee4222052a76559c20e821bc3519cefb58b6d3e9
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49235
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcuq-w2hp-xubb
98
url VCID-ge37-2by5-yudu
vulnerability_id VCID-ge37-2by5-yudu
summary kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1679.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1679.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1679
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13928
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.14011
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14065
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13869
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13953
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.14006
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13962
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13926
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13876
published_at 2026-04-13T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13783
published_at 2026-04-16T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13778
published_at 2026-04-18T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13853
published_at 2026-04-21T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13878
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1679
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084125
reference_id 2084125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084125
5
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
10
reference_url https://usn.ubuntu.com/5500-1/
reference_id USN-5500-1
reference_type
scores
url https://usn.ubuntu.com/5500-1/
11
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
12
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
13
reference_url https://usn.ubuntu.com/5517-1/
reference_id USN-5517-1
reference_type
scores
url https://usn.ubuntu.com/5517-1/
14
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
15
reference_url https://usn.ubuntu.com/5544-1/
reference_id USN-5544-1
reference_type
scores
url https://usn.ubuntu.com/5544-1/
16
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
17
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
18
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
19
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
20
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
21
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
fixed_packages
aliases CVE-2022-1679
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ge37-2by5-yudu
99
url VCID-gvxp-zyrr-s7em
vulnerability_id VCID-gvxp-zyrr-s7em
summary kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49060.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49060.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49060
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02235
published_at 2026-04-24T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02182
published_at 2026-04-12T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02178
published_at 2026-04-13T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02156
published_at 2026-04-16T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02168
published_at 2026-04-18T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02253
published_at 2026-04-21T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19192
published_at 2026-04-11T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.2406
published_at 2026-04-09T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23947
published_at 2026-04-07T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24014
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49060
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49060
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49060
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/22025513ced3d599ee8b24169141c95cf2467a4a
reference_id 22025513ced3d599ee8b24169141c95cf2467a4a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/22025513ced3d599ee8b24169141c95cf2467a4a
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348065
reference_id 2348065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348065
6
reference_url https://git.kernel.org/stable/c/35b91e49bc80ca944a8679c3b139ddaf2f8eea0f
reference_id 35b91e49bc80ca944a8679c3b139ddaf2f8eea0f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/35b91e49bc80ca944a8679c3b139ddaf2f8eea0f
7
reference_url https://git.kernel.org/stable/c/3a523807f01455fe9a0c1a433f27cd4411ee400f
reference_id 3a523807f01455fe9a0c1a433f27cd4411ee400f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/3a523807f01455fe9a0c1a433f27cd4411ee400f
8
reference_url https://git.kernel.org/stable/c/a05f5e26cb8bb4d07e0595545fcad1bb406f0085
reference_id a05f5e26cb8bb4d07e0595545fcad1bb406f0085
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/a05f5e26cb8bb4d07e0595545fcad1bb406f0085
9
reference_url https://git.kernel.org/stable/c/d22f4f977236f97e01255a80bca2ea93a8094fc8
reference_id d22f4f977236f97e01255a80bca2ea93a8094fc8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:49:56Z/
url https://git.kernel.org/stable/c/d22f4f977236f97e01255a80bca2ea93a8094fc8
10
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49060
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gvxp-zyrr-s7em
100
url VCID-gx5c-b8jv-nqae
vulnerability_id VCID-gx5c-b8jv-nqae
summary kernel: NFSv4: Fix free of uninitialized nfs4_label on referral lookup.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49418.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49418.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49418
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11337
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11394
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19023
published_at 2026-04-09T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.1903
published_at 2026-04-11T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18983
published_at 2026-04-12T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.18932
published_at 2026-04-13T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.18886
published_at 2026-04-16T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18899
published_at 2026-04-18T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18911
published_at 2026-04-21T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.188
published_at 2026-04-24T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.1889
published_at 2026-04-07T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18969
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49418
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348347
reference_id 2348347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348347
4
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49418
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gx5c-b8jv-nqae
101
url VCID-h2wd-jwjk-quhr
vulnerability_id VCID-h2wd-jwjk-quhr
summary kernel: RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49199.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49199
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21755
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21698
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21705
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49199
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347806
reference_id 2347806
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347806
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49199
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2wd-jwjk-quhr
102
url VCID-h4y4-y8zk-s3aw
vulnerability_id VCID-h4y4-y8zk-s3aw
summary kernel: ALSA: hda: Fix UAF of leds class devs at unbinding
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48735.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48735
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04859
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05036
published_at 2026-04-24T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0492
published_at 2026-04-12T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04901
published_at 2026-04-13T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.0485
published_at 2026-04-16T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04858
published_at 2026-04-18T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05006
published_at 2026-04-21T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04886
published_at 2026-04-04T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04904
published_at 2026-04-07T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.0494
published_at 2026-04-11T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04957
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0e629052f013eeb61494d4df2f1f647c2a9aef47
reference_id 0e629052f013eeb61494d4df2f1f647c2a9aef47
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/0e629052f013eeb61494d4df2f1f647c2a9aef47
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2293324
reference_id 2293324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2293324
6
reference_url https://git.kernel.org/stable/c/549f8ffc7b2f7561bea7f90930b6c5104318e87b
reference_id 549f8ffc7b2f7561bea7f90930b6c5104318e87b
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/549f8ffc7b2f7561bea7f90930b6c5104318e87b
7
reference_url https://git.kernel.org/stable/c/813e9f3e06d22e29872d4fd51b54992d89cf66c8
reference_id 813e9f3e06d22e29872d4fd51b54992d89cf66c8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/813e9f3e06d22e29872d4fd51b54992d89cf66c8
8
reference_url https://git.kernel.org/stable/c/a7de1002135cf94367748ffc695a29812d7633b5
reference_id a7de1002135cf94367748ffc695a29812d7633b5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T17:10:50Z/
url https://git.kernel.org/stable/c/a7de1002135cf94367748ffc695a29812d7633b5
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-48735
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4y4-y8zk-s3aw
103
url VCID-h5cf-6zve-kudd
vulnerability_id VCID-h5cf-6zve-kudd
summary kernel: ip_gre: test csum_start instead of transport header
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49340.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49340
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28583
published_at 2026-04-09T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28585
published_at 2026-04-11T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28541
published_at 2026-04-12T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28491
published_at 2026-04-13T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28507
published_at 2026-04-16T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28485
published_at 2026-04-18T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28438
published_at 2026-04-21T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28322
published_at 2026-04-24T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28477
published_at 2026-04-07T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28543
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49340
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348074
reference_id 2348074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348074
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49340
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5cf-6zve-kudd
104
url VCID-h5yv-de9v-r3hh
vulnerability_id VCID-h5yv-de9v-r3hh
summary kernel: wifi: rtw89: 8852a: rfk: fix div 0 exception
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50178.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50178.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50178
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50178
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373427
reference_id 2373427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373427
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50178
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h5yv-de9v-r3hh
105
url VCID-h8qz-fp8v-1uge
vulnerability_id VCID-h8qz-fp8v-1uge
summary kernel: XArray: Fix xas_create_range() when multi-order entry present
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49152.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49152
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06595
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06559
published_at 2026-04-02T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32037
published_at 2026-04-09T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32041
published_at 2026-04-11T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32002
published_at 2026-04-16T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.31969
published_at 2026-04-13T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.31979
published_at 2026-04-18T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.31952
published_at 2026-04-21T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.31783
published_at 2026-04-24T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.31957
published_at 2026-04-07T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.32008
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49152
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348324
reference_id 2348324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348324
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49152
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h8qz-fp8v-1uge
106
url VCID-hhf3-eu8v-9fds
vulnerability_id VCID-hhf3-eu8v-9fds
summary kernel: dm raid: fix address sanitizer warning in raid_status
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50084.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50084
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04672
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04708
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04724
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04757
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04769
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0476
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15095
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14995
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15005
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15056
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50084
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50084
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373667
reference_id 2373667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373667
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50084
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hhf3-eu8v-9fds
107
url VCID-hnr4-z1a1-1bdu
vulnerability_id VCID-hnr4-z1a1-1bdu
summary kernel: netfilter: use get_random_u32 instead of prandom
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49698.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49698
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30144
published_at 2026-04-09T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30147
published_at 2026-04-11T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30105
published_at 2026-04-12T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30056
published_at 2026-04-13T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30068
published_at 2026-04-16T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-18T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30001
published_at 2026-04-21T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.29929
published_at 2026-04-24T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30049
published_at 2026-04-07T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30109
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49698
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347983
reference_id 2347983
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347983
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://usn.ubuntu.com/7990-1/
reference_id USN-7990-1
reference_type
scores
url https://usn.ubuntu.com/7990-1/
8
reference_url https://usn.ubuntu.com/7990-2/
reference_id USN-7990-2
reference_type
scores
url https://usn.ubuntu.com/7990-2/
9
reference_url https://usn.ubuntu.com/7990-3/
reference_id USN-7990-3
reference_type
scores
url https://usn.ubuntu.com/7990-3/
10
reference_url https://usn.ubuntu.com/7990-4/
reference_id USN-7990-4
reference_type
scores
url https://usn.ubuntu.com/7990-4/
11
reference_url https://usn.ubuntu.com/7990-5/
reference_id USN-7990-5
reference_type
scores
url https://usn.ubuntu.com/7990-5/
12
reference_url https://usn.ubuntu.com/7990-6/
reference_id USN-7990-6
reference_type
scores
url https://usn.ubuntu.com/7990-6/
fixed_packages
aliases CVE-2022-49698
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnr4-z1a1-1bdu
108
url VCID-hnyy-rfkm-abec
vulnerability_id VCID-hnyy-rfkm-abec
summary kernel: NULL pointer dereference in udf_expand_file_adinicbdue() during writeback
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0617.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0617
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05692
published_at 2026-04-24T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05657
published_at 2026-04-21T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06838
published_at 2026-04-02T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06866
published_at 2026-04-04T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06852
published_at 2026-04-07T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06907
published_at 2026-04-08T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06938
published_at 2026-04-09T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-11T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06927
published_at 2026-04-12T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06923
published_at 2026-04-13T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06862
published_at 2026-04-16T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06845
published_at 2026-04-18T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.0676
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0617
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636
55
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
56
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053632
reference_id 2053632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053632
57
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
58
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
59
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
60
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
61
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
62
reference_url https://usn.ubuntu.com/5383-1/
reference_id USN-5383-1
reference_type
scores
url https://usn.ubuntu.com/5383-1/
63
reference_url https://usn.ubuntu.com/5384-1/
reference_id USN-5384-1
reference_type
scores
url https://usn.ubuntu.com/5384-1/
64
reference_url https://usn.ubuntu.com/5385-1/
reference_id USN-5385-1
reference_type
scores
url https://usn.ubuntu.com/5385-1/
65
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
66
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
67
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-0617
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hnyy-rfkm-abec
109
url VCID-hrfh-56vj-jufm
vulnerability_id VCID-hrfh-56vj-jufm
summary kernel: usb: usbip: fix a refcount leak in stub_probe()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49389.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49389
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09738
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09788
published_at 2026-04-04T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13786
published_at 2026-04-09T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-11T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13718
published_at 2026-04-12T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13668
published_at 2026-04-13T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13579
published_at 2026-04-16T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13576
published_at 2026-04-18T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13649
published_at 2026-04-21T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.1366
published_at 2026-04-24T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-07T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13736
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49389
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49389
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347796
reference_id 2347796
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347796
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49389
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrfh-56vj-jufm
110
url VCID-j157-dgq1-yfat
vulnerability_id VCID-j157-dgq1-yfat
summary kernel: bfq: Make sure bfqg for which we are queueing requests is online
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49411.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49411.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49411
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10701
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10638
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.23978
published_at 2026-04-24T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24096
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24162
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24207
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24224
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24182
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24125
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.2414
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24127
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24103
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49411
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49411
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd
reference_id 075a53b78b815301f8d3dd1ee2cd99554e34f0dd
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:14:17Z/
url https://git.kernel.org/stable/c/075a53b78b815301f8d3dd1ee2cd99554e34f0dd
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347861
reference_id 2347861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347861
6
reference_url https://git.kernel.org/stable/c/51f724bffa3403a5236597e6b75df7329c1ec6e9
reference_id 51f724bffa3403a5236597e6b75df7329c1ec6e9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:14:17Z/
url https://git.kernel.org/stable/c/51f724bffa3403a5236597e6b75df7329c1ec6e9
7
reference_url https://git.kernel.org/stable/c/6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b
reference_id 6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:14:17Z/
url https://git.kernel.org/stable/c/6ee0868b0c3ccead5907685fcdcdd0c08dfe4b0b
8
reference_url https://git.kernel.org/stable/c/7781c38552e6cc54ed8e9040279561340516b881
reference_id 7781c38552e6cc54ed8e9040279561340516b881
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:14:17Z/
url https://git.kernel.org/stable/c/7781c38552e6cc54ed8e9040279561340516b881
9
reference_url https://git.kernel.org/stable/c/97bd6c56bdcb41079e488e31df56809e3b2ce628
reference_id 97bd6c56bdcb41079e488e31df56809e3b2ce628
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:14:17Z/
url https://git.kernel.org/stable/c/97bd6c56bdcb41079e488e31df56809e3b2ce628
10
reference_url https://git.kernel.org/stable/c/ccddf8cd411c1800863ed357064e56ceffd356bb
reference_id ccddf8cd411c1800863ed357064e56ceffd356bb
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-05T21:14:17Z/
url https://git.kernel.org/stable/c/ccddf8cd411c1800863ed357064e56ceffd356bb
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49411
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j157-dgq1-yfat
111
url VCID-j9e3-n3tr-hyht
vulnerability_id VCID-j9e3-n3tr-hyht
summary kernel: blk-iolatency: Fix inflight count imbalances and IO hangs on offline
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49394.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49394
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16387
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1637
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16239
published_at 2026-04-07T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16324
published_at 2026-04-08T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16331
published_at 2026-04-12T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16263
published_at 2026-04-13T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18294
published_at 2026-04-24T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18357
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347830
reference_id 2347830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347830
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49394
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9e3-n3tr-hyht
112
url VCID-j9ry-7pb3-27ff
vulnerability_id VCID-j9ry-7pb3-27ff
summary kernel: ALSA: jack: Access input_dev under mutex
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49538.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49538
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07529
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12526
published_at 2026-04-24T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12478
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12556
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12607
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12575
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12534
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12495
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12398
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12403
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49538
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49538
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2
reference_id 1b6a6fc5280e97559287b61eade2d4b363e836f2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347946
reference_id 2347946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347946
6
reference_url https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348
reference_id 582aea6084cc59fec881204f026816d1219f2348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348
7
reference_url https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
reference_id 5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5
8
reference_url https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09
reference_id 74bab3bcf422593c582e47130aa8eb41ebb2dc09
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09
9
reference_url https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879
reference_id 8487a88136d54a1a4d3f26f1399685db648ab879
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879
10
reference_url https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
reference_id 9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4
11
reference_url https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00
reference_id c093b62c40027c21d649c5534ad7aa3605a99b00
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00
12
reference_url https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a
reference_id e2b8681769f6e205382f026b907d28aa5ec9d59a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a
13
reference_url https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde
reference_id f68bed124c7699e23ffb4ce4fcc84671e9193cde
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:42Z/
url https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49538
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9ry-7pb3-27ff
113
url VCID-jar8-nqnp-pqbw
vulnerability_id VCID-jar8-nqnp-pqbw
summary kernel: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49559.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49559.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49559
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11704
published_at 2026-04-09T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11716
published_at 2026-04-11T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11679
published_at 2026-04-12T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11653
published_at 2026-04-13T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.1151
published_at 2026-04-16T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11514
published_at 2026-04-18T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11637
published_at 2026-04-21T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11594
published_at 2026-04-24T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11564
published_at 2026-04-07T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.1165
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49559
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348281
reference_id 2348281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348281
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49559
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jar8-nqnp-pqbw
114
url VCID-jdjk-pv6p-skct
vulnerability_id VCID-jdjk-pv6p-skct
summary kernel: scsi: qla2xxx: Fix crash during module load unload test
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49160.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49160.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49160
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-13T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-16T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23677
published_at 2026-04-18T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-21T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23544
published_at 2026-04-24T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-07T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49160
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49160
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49160
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347673
reference_id 2347673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347673
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49160
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdjk-pv6p-skct
115
url VCID-jptx-14zk-5bat
vulnerability_id VCID-jptx-14zk-5bat
summary kernel: kernel info leak issue in pfkey_register
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1353.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1353.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1353
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02392
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.0241
published_at 2026-04-21T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04493
published_at 2026-04-18T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04513
published_at 2026-04-13T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04484
published_at 2026-04-16T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04427
published_at 2026-04-01T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04466
published_at 2026-04-02T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04491
published_at 2026-04-04T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04504
published_at 2026-04-07T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.0454
published_at 2026-04-08T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04556
published_at 2026-04-09T12:55:00Z
11
value 0.00018
scoring_system epss
scoring_elements 0.04543
published_at 2026-04-11T12:55:00Z
12
value 0.00018
scoring_system epss
scoring_elements 0.04528
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1353
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2066819
reference_id 2066819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2066819
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:5934
reference_id RHSA-2022:5934
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5934
49
reference_url https://access.redhat.com/errata/RHSA-2022:5998
reference_id RHSA-2022:5998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5998
50
reference_url https://access.redhat.com/errata/RHSA-2022:6243
reference_id RHSA-2022:6243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6243
51
reference_url https://access.redhat.com/errata/RHSA-2022:6248
reference_id RHSA-2022:6248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6248
52
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
53
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
54
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
55
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
56
reference_url https://access.redhat.com/errata/RHSA-2023:4801
reference_id RHSA-2023:4801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4801
57
reference_url https://access.redhat.com/errata/RHSA-2023:4814
reference_id RHSA-2023:4814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4814
58
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
59
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
60
reference_url https://usn.ubuntu.com/5500-1/
reference_id USN-5500-1
reference_type
scores
url https://usn.ubuntu.com/5500-1/
61
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
62
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
63
reference_url https://usn.ubuntu.com/5515-1/
reference_id USN-5515-1
reference_type
scores
url https://usn.ubuntu.com/5515-1/
64
reference_url https://usn.ubuntu.com/5541-1/
reference_id USN-5541-1
reference_type
scores
url https://usn.ubuntu.com/5541-1/
fixed_packages
aliases CVE-2022-1353
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jptx-14zk-5bat
116
url VCID-jv67-34h2-wbfj
vulnerability_id VCID-jv67-34h2-wbfj
summary kernel: ext4: fix bug_on in ext4_writepages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49347.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49347.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49347
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06177
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06208
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08422
published_at 2026-04-09T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08413
published_at 2026-04-11T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08393
published_at 2026-04-12T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08378
published_at 2026-04-13T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08271
published_at 2026-04-16T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08253
published_at 2026-04-18T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08414
published_at 2026-04-21T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08384
published_at 2026-04-24T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08334
published_at 2026-04-07T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08405
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49347
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49347
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347821
reference_id 2347821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347821
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49347
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jv67-34h2-wbfj
117
url VCID-jypn-zeph-bbha
vulnerability_id VCID-jypn-zeph-bbha
summary kernel: sfc: fix kernel panic when creating VF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49625.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49625
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02883
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02868
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07592
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07504
published_at 2026-04-18T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07645
published_at 2026-04-21T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08823
published_at 2026-04-07T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10047
published_at 2026-04-11T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-12T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09985
published_at 2026-04-13T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.0986
published_at 2026-04-16T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.09982
published_at 2026-04-08T12:55:00Z
11
value 0.00034
scoring_system epss
scoring_elements 0.10031
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49625
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49625
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348265
reference_id 2348265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348265
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49625
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jypn-zeph-bbha
118
url VCID-k3ex-xfx7-k7a5
vulnerability_id VCID-k3ex-xfx7-k7a5
summary kernel: arch/arm64: Fix topology initialization for core scheduling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49090.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49090
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08344
published_at 2026-04-24T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08346
published_at 2026-04-12T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-13T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08226
published_at 2026-04-16T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08213
published_at 2026-04-18T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08374
published_at 2026-04-21T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.17105
published_at 2026-04-11T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-07T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49090
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348218
reference_id 2348218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348218
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49090
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ex-xfx7-k7a5
119
url VCID-k883-unu8-1fhx
vulnerability_id VCID-k883-unu8-1fhx
summary kernel: block: don't delete queue kobject before its children
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49259.json
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49259.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49259
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01352
published_at 2026-04-24T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01256
published_at 2026-04-16T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01269
published_at 2026-04-18T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01344
published_at 2026-04-21T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01276
published_at 2026-04-07T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-08T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-09T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01267
published_at 2026-04-11T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01262
published_at 2026-04-12T12:55:00Z
9
value 0.00011
scoring_system epss
scoring_elements 0.01265
published_at 2026-04-13T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16388
published_at 2026-04-02T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1645
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49259
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49259
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348360
reference_id 2348360
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348360
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49259
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k883-unu8-1fhx
120
url VCID-kp8q-4wu1-xkbs
vulnerability_id VCID-kp8q-4wu1-xkbs
summary kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49615.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49615
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.1462
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.1455
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31467
published_at 2026-04-24T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31739
published_at 2026-04-09T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31742
published_at 2026-04-11T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-12T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31666
published_at 2026-04-13T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31699
published_at 2026-04-16T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31677
published_at 2026-04-18T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31645
published_at 2026-04-21T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31658
published_at 2026-04-07T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.3171
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49615
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/1df793d479bef546569fc2e409ff8bb3f0fb8e99
reference_id 1df793d479bef546569fc2e409ff8bb3f0fb8e99
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:34:51Z/
url https://git.kernel.org/stable/c/1df793d479bef546569fc2e409ff8bb3f0fb8e99
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347956
reference_id 2347956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347956
5
reference_url https://git.kernel.org/stable/c/269be8b2907378adf72d7347cfa43ef230351a06
reference_id 269be8b2907378adf72d7347cfa43ef230351a06
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:34:51Z/
url https://git.kernel.org/stable/c/269be8b2907378adf72d7347cfa43ef230351a06
6
reference_url https://git.kernel.org/stable/c/7bb71133cae88d3003a3490b97864af76533072b
reference_id 7bb71133cae88d3003a3490b97864af76533072b
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:34:51Z/
url https://git.kernel.org/stable/c/7bb71133cae88d3003a3490b97864af76533072b
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49615
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kp8q-4wu1-xkbs
121
url VCID-ksaf-6va1-a3cd
vulnerability_id VCID-ksaf-6va1-a3cd
summary kernel: xsk: Fix race at socket teardown
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49215.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49215
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07965
published_at 2026-04-02T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08011
published_at 2026-04-04T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15457
published_at 2026-04-09T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15418
published_at 2026-04-11T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15379
published_at 2026-04-12T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15314
published_at 2026-04-13T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15231
published_at 2026-04-16T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15236
published_at 2026-04-18T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15287
published_at 2026-04-21T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15327
published_at 2026-04-24T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15318
published_at 2026-04-07T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15406
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49215
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347654
reference_id 2347654
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347654
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49215
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksaf-6va1-a3cd
122
url VCID-ksbt-eq7q-y3d8
vulnerability_id VCID-ksbt-eq7q-y3d8
summary hw: Intel: Improper restriction in memory buffer in graphics drivers cause escalation of privilege
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28410.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28410
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23704
published_at 2026-04-02T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23357
published_at 2026-04-24T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23618
published_at 2026-04-12T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23561
published_at 2026-04-13T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23574
published_at 2026-04-16T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23563
published_at 2026-04-18T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23542
published_at 2026-04-21T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23747
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23527
published_at 2026-04-07T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23599
published_at 2026-04-08T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-09T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.2366
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28410
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28410
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2203831
reference_id 2203831
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2203831
5
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html
reference_id intel-sa-00886.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T15:27:26Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html
6
reference_url https://security.netapp.com/advisory/ntap-20230622-0004/
reference_id ntap-20230622-0004
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T15:27:26Z/
url https://security.netapp.com/advisory/ntap-20230622-0004/
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2023-28410
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksbt-eq7q-y3d8
123
url VCID-kw9v-ery2-sffr
vulnerability_id VCID-kw9v-ery2-sffr
summary Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29901
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22272
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22055
published_at 2026-04-07T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22136
published_at 2026-04-08T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.2219
published_at 2026-04-09T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22211
published_at 2026-04-11T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22171
published_at 2026-04-12T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-13T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.2211
published_at 2026-04-16T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-18T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22058
published_at 2026-04-21T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.21918
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29901
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103148
reference_id 2103148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103148
12
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
13
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
14
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
15
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
16
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
17
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
18
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
19
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
20
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
21
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
22
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
23
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
24
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
25
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
26
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
27
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
28
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
29
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
30
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
31
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
32
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
33
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
34
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
35
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
aliases CVE-2022-29901
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr
124
url VCID-m1yb-dke2-xkb4
vulnerability_id VCID-m1yb-dke2-xkb4
summary kernel: RDMA/hfi1: Prevent use of lock before it is initialized
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49433.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49433
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14406
published_at 2026-04-24T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18459
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18511
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18512
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18464
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18413
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18357
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49433
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348214
reference_id 2348214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348214
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49433
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1yb-dke2-xkb4
125
url VCID-m5ak-dw88-t3hk
vulnerability_id VCID-m5ak-dw88-t3hk
summary kernel: vmxnet3: use-after-free in vmxnet3_rq_alloc_rx_buf()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4387.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4387.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4387
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00928
published_at 2026-04-02T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00929
published_at 2026-04-04T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00932
published_at 2026-04-09T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00936
published_at 2026-04-08T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00921
published_at 2026-04-18T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00916
published_at 2026-04-12T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00917
published_at 2026-04-13T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00914
published_at 2026-04-16T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00972
published_at 2026-04-21T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00974
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4387
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2219270
reference_id 2219270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2219270
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://usn.ubuntu.com/6388-1/
reference_id USN-6388-1
reference_type
scores
url https://usn.ubuntu.com/6388-1/
fixed_packages
aliases CVE-2023-4387
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5ak-dw88-t3hk
126
url VCID-m7kz-3jyd-3fak
vulnerability_id VCID-m7kz-3jyd-3fak
summary kernel: block: Fix the maximum minor value is blk_alloc_ext_minor()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49147.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49147.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49147
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21795
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21755
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21698
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21705
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21526
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49147
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348106
reference_id 2348106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348106
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49147
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m7kz-3jyd-3fak
127
url VCID-mh44-msu4-3qbv
vulnerability_id VCID-mh44-msu4-3qbv
summary kernel: ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49291.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49291.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49291
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02317
published_at 2026-04-24T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02264
published_at 2026-04-08T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02286
published_at 2026-04-09T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02268
published_at 2026-04-11T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02256
published_at 2026-04-12T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02254
published_at 2026-04-13T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02236
published_at 2026-04-16T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02246
published_at 2026-04-18T12:55:00Z
8
value 0.00013
scoring_system epss
scoring_elements 0.0234
published_at 2026-04-21T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08241
published_at 2026-04-04T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08186
published_at 2026-04-02T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17163
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49291
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49291
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8
reference_id 0090c13cbbdffd7da079ac56f80373a9a1be0bf8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/0090c13cbbdffd7da079ac56f80373a9a1be0bf8
5
reference_url https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8
reference_id 0f6947f5f5208f6ebd4d76a82a4757e2839a23f8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/0f6947f5f5208f6ebd4d76a82a4757e2839a23f8
6
reference_url https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b
reference_id 1bbf82d9f961414d6c76a08f7f843ea068e0ab7b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/1bbf82d9f961414d6c76a08f7f843ea068e0ab7b
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347842
reference_id 2347842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347842
8
reference_url https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438
reference_id 33061d0fba51d2bf70a2ef9645f703c33fe8e438
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/33061d0fba51d2bf70a2ef9645f703c33fe8e438
9
reference_url https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb
reference_id 92ee3c60ec9fe64404dc035e7c41277d74aa26cb
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/92ee3c60ec9fe64404dc035e7c41277d74aa26cb
10
reference_url https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9
reference_id 9cb6c40a6ebe4a0cfc9d6a181958211682cffea9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/9cb6c40a6ebe4a0cfc9d6a181958211682cffea9
11
reference_url https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092
reference_id a42aa926843acca96c0dfbde2e835b8137f2f092
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/a42aa926843acca96c0dfbde2e835b8137f2f092
12
reference_url https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69
reference_id fbeb492694ce0441053de57699e1e2b7bc148a69
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:58:45Z/
url https://git.kernel.org/stable/c/fbeb492694ce0441053de57699e1e2b7bc148a69
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
14
reference_url https://access.redhat.com/errata/RHSA-2024:4107
reference_id RHSA-2024:4107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4107
fixed_packages
aliases CVE-2022-49291
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mh44-msu4-3qbv
128
url VCID-nssg-bpjj-d3be
vulnerability_id VCID-nssg-bpjj-d3be
summary kernel: KVM: x86/mmu: make apf token non-zero to fix bug
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48943.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48943.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48943
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.0739
published_at 2026-04-16T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07464
published_at 2026-04-24T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.0749
published_at 2026-04-11T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07478
published_at 2026-04-12T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07466
published_at 2026-04-13T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07376
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07505
published_at 2026-04-21T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07434
published_at 2026-04-04T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07416
published_at 2026-04-07T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07472
published_at 2026-04-08T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07496
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48943
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2307199
reference_id 2307199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2307199
5
reference_url https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c
reference_id 4c3644b6c96c5daa5149e5abddc07234eea47c7c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/4c3644b6c96c5daa5149e5abddc07234eea47c7c
6
reference_url https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573
reference_id 62040f5cd7d937de547836e747b6aa8212fec573
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/62040f5cd7d937de547836e747b6aa8212fec573
7
reference_url https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
reference_id 6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/6f3c1fc53d86d580d8d6d749c4af23705e4f6f79
8
reference_url https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02
reference_id 72fdfc75d4217b32363cc80def3de2cb3fef3f02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T15:33:08Z/
url https://git.kernel.org/stable/c/72fdfc75d4217b32363cc80def3de2cb3fef3f02
9
reference_url https://access.redhat.com/errata/RHSA-2022:6003
reference_id RHSA-2022:6003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6003
10
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
11
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
12
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
13
reference_url https://usn.ubuntu.com/7121-1/
reference_id USN-7121-1
reference_type
scores
url https://usn.ubuntu.com/7121-1/
14
reference_url https://usn.ubuntu.com/7121-2/
reference_id USN-7121-2
reference_type
scores
url https://usn.ubuntu.com/7121-2/
15
reference_url https://usn.ubuntu.com/7121-3/
reference_id USN-7121-3
reference_type
scores
url https://usn.ubuntu.com/7121-3/
16
reference_url https://usn.ubuntu.com/7122-1/
reference_id USN-7122-1
reference_type
scores
url https://usn.ubuntu.com/7122-1/
17
reference_url https://usn.ubuntu.com/7148-1/
reference_id USN-7148-1
reference_type
scores
url https://usn.ubuntu.com/7148-1/
18
reference_url https://usn.ubuntu.com/7159-1/
reference_id USN-7159-1
reference_type
scores
url https://usn.ubuntu.com/7159-1/
19
reference_url https://usn.ubuntu.com/7159-2/
reference_id USN-7159-2
reference_type
scores
url https://usn.ubuntu.com/7159-2/
20
reference_url https://usn.ubuntu.com/7159-3/
reference_id USN-7159-3
reference_type
scores
url https://usn.ubuntu.com/7159-3/
21
reference_url https://usn.ubuntu.com/7159-4/
reference_id USN-7159-4
reference_type
scores
url https://usn.ubuntu.com/7159-4/
22
reference_url https://usn.ubuntu.com/7159-5/
reference_id USN-7159-5
reference_type
scores
url https://usn.ubuntu.com/7159-5/
23
reference_url https://usn.ubuntu.com/7195-1/
reference_id USN-7195-1
reference_type
scores
url https://usn.ubuntu.com/7195-1/
24
reference_url https://usn.ubuntu.com/7195-2/
reference_id USN-7195-2
reference_type
scores
url https://usn.ubuntu.com/7195-2/
fixed_packages
aliases CVE-2022-48943
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nssg-bpjj-d3be
129
url VCID-p1h2-jzsz-7fau
vulnerability_id VCID-p1h2-jzsz-7fau
summary kernel: scsi: lpfc: Fix call trace observed during I/O with CMF enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49537.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49537
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08267
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08319
published_at 2026-04-04T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22679
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22697
published_at 2026-04-11T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22656
published_at 2026-04-12T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.226
published_at 2026-04-13T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22615
published_at 2026-04-16T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22612
published_at 2026-04-18T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22561
published_at 2026-04-21T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22409
published_at 2026-04-24T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.2255
published_at 2026-04-07T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22627
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49537
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348079
reference_id 2348079
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348079
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49537
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p1h2-jzsz-7fau
130
url VCID-pdxe-wqnn-s3gb
vulnerability_id VCID-pdxe-wqnn-s3gb
summary kernel: ALSA: usb-audio: Cancel pending work at closing a MIDI substream
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49545.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49545
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25878
published_at 2026-04-09T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.2589
published_at 2026-04-11T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25756
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25827
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25777
published_at 2026-04-18T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25749
published_at 2026-04-21T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25848
published_at 2026-04-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25791
published_at 2026-04-13T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25794
published_at 2026-04-16T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28172
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49545
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348289
reference_id 2348289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348289
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-49545
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdxe-wqnn-s3gb
131
url VCID-pv2y-hzvr-hyad
vulnerability_id VCID-pv2y-hzvr-hyad
summary kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28390.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28390
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03085
published_at 2026-04-24T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02991
published_at 2026-04-12T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02982
published_at 2026-04-13T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02959
published_at 2026-04-16T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02969
published_at 2026-04-18T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03089
published_at 2026-04-21T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03007
published_at 2026-04-02T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03021
published_at 2026-04-04T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03026
published_at 2026-04-07T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03028
published_at 2026-04-08T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03052
published_at 2026-04-09T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.03015
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28390
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
42
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073064
reference_id 2073064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073064
44
reference_url https://security.archlinux.org/AVG-2698
reference_id AVG-2698
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2698
45
reference_url https://security.archlinux.org/AVG-2699
reference_id AVG-2699
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2699
46
reference_url https://security.archlinux.org/AVG-2700
reference_id AVG-2700
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2700
47
reference_url https://security.archlinux.org/AVG-2701
reference_id AVG-2701
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2701
48
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
49
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
50
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
51
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
52
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
53
reference_url https://usn.ubuntu.com/5413-1/
reference_id USN-5413-1
reference_type
scores
url https://usn.ubuntu.com/5413-1/
54
reference_url https://usn.ubuntu.com/5416-1/
reference_id USN-5416-1
reference_type
scores
url https://usn.ubuntu.com/5416-1/
55
reference_url https://usn.ubuntu.com/5466-1/
reference_id USN-5466-1
reference_type
scores
url https://usn.ubuntu.com/5466-1/
56
reference_url https://usn.ubuntu.com/5467-1/
reference_id USN-5467-1
reference_type
scores
url https://usn.ubuntu.com/5467-1/
57
reference_url https://usn.ubuntu.com/5468-1/
reference_id USN-5468-1
reference_type
scores
url https://usn.ubuntu.com/5468-1/
58
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
fixed_packages
aliases CVE-2022-28390
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv2y-hzvr-hyad
132
url VCID-pztf-yx5c-y7a2
vulnerability_id VCID-pztf-yx5c-y7a2
summary kernel: media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49247.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49247.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49247
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01177
published_at 2026-04-09T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01176
published_at 2026-04-08T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01162
published_at 2026-04-11T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01155
published_at 2026-04-12T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01159
published_at 2026-04-18T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01147
published_at 2026-04-16T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.0117
published_at 2026-04-07T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00902
published_at 2026-04-21T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00904
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49247
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49247
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49247
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347676
reference_id 2347676
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347676
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49247
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pztf-yx5c-y7a2
133
url VCID-q43k-2kyw-1kbu
vulnerability_id VCID-q43k-2kyw-1kbu
summary kernel: blk-throttle: Set BIO_THROTTLED when bio has been throttled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49465.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49465.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49465
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16515
published_at 2026-04-04T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16453
published_at 2026-04-02T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30499
published_at 2026-04-24T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30699
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30756
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30788
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30791
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30701
published_at 2026-04-13T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30725
published_at 2026-04-16T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30706
published_at 2026-04-18T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30671
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49465
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49465
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/047ea38d41d90d748bca812a43339632f52ba715
reference_id 047ea38d41d90d748bca812a43339632f52ba715
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:02Z/
url https://git.kernel.org/stable/c/047ea38d41d90d748bca812a43339632f52ba715
5
reference_url https://git.kernel.org/stable/c/0cfc8a0fb07cde61915e4a77c4794c47de3114a4
reference_id 0cfc8a0fb07cde61915e4a77c4794c47de3114a4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:02Z/
url https://git.kernel.org/stable/c/0cfc8a0fb07cde61915e4a77c4794c47de3114a4
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347776
reference_id 2347776
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347776
7
reference_url https://git.kernel.org/stable/c/24ba80efaf6e772f6132465fad08e20fb4767da7
reference_id 24ba80efaf6e772f6132465fad08e20fb4767da7
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:02Z/
url https://git.kernel.org/stable/c/24ba80efaf6e772f6132465fad08e20fb4767da7
8
reference_url https://git.kernel.org/stable/c/5a011f889b4832aa80c2a872a5aade5c48d2756f
reference_id 5a011f889b4832aa80c2a872a5aade5c48d2756f
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:02Z/
url https://git.kernel.org/stable/c/5a011f889b4832aa80c2a872a5aade5c48d2756f
9
reference_url https://git.kernel.org/stable/c/935fa666534d7b7185e8c6b0191cd06281be4290
reference_id 935fa666534d7b7185e8c6b0191cd06281be4290
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:02Z/
url https://git.kernel.org/stable/c/935fa666534d7b7185e8c6b0191cd06281be4290
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
12
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
13
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
14
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
15
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
16
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
17
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
18
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
19
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
fixed_packages
aliases CVE-2022-49465
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q43k-2kyw-1kbu
134
url VCID-q55w-hud9-9ydw
vulnerability_id VCID-q55w-hud9-9ydw
summary kernel: ptp: Fix possible memory leak in ptp_clock_register()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47455.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47455.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47455
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04762
published_at 2026-04-01T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04822
published_at 2026-04-18T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04999
published_at 2026-04-24T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04883
published_at 2026-04-12T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.04864
published_at 2026-04-13T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04813
published_at 2026-04-16T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04966
published_at 2026-04-21T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04848
published_at 2026-04-04T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04866
published_at 2026-04-07T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04903
published_at 2026-04-11T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.0492
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47455
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282903
reference_id 2282903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282903
5
reference_url https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0
reference_id 4225fea1cb28370086e17e82c0f69bec2779dca0
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:55:42Z/
url https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0
6
reference_url https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8
reference_id 95c0a0c5ec8839f8f21672be786e87a100319ca8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:55:42Z/
url https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8
7
reference_url https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524
reference_id f1c96d8085588e1b997a96214b409ac3be20b524
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-10T18:55:42Z/
url https://git.kernel.org/stable/c/f1c96d8085588e1b997a96214b409ac3be20b524
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:7000
reference_id RHSA-2024:7000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7000
10
reference_url https://access.redhat.com/errata/RHSA-2024:7001
reference_id RHSA-2024:7001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7001
fixed_packages
aliases CVE-2021-47455
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q55w-hud9-9ydw
135
url VCID-q5kt-n8qx-57dd
vulnerability_id VCID-q5kt-n8qx-57dd
summary kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1095.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1095
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03721
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03799
published_at 2026-04-24T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03711
published_at 2026-04-12T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03685
published_at 2026-04-13T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03661
published_at 2026-04-16T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03673
published_at 2026-04-18T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03794
published_at 2026-04-21T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03732
published_at 2026-04-04T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03746
published_at 2026-04-07T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.0375
published_at 2026-04-08T12:55:00Z
10
value 0.00016
scoring_system epss
scoring_elements 0.03774
published_at 2026-04-09T12:55:00Z
11
value 0.00016
scoring_system epss
scoring_elements 0.03733
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1095
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2173973
reference_id 2173973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2173973
5
reference_url https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
reference_id 580077855a40741cf511766129702d97ff02f4d9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T17:30:41Z/
url https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://access.redhat.com/errata/RHSA-2023:2736
reference_id RHSA-2023:2736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2736
9
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
10
reference_url https://access.redhat.com/errata/RHSA-2023:5627
reference_id RHSA-2023:5627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5627
11
reference_url https://access.redhat.com/errata/RHSA-2023:5628
reference_id RHSA-2023:5628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5628
12
reference_url https://access.redhat.com/errata/RHSA-2023:6813
reference_id RHSA-2023:6813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6813
13
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
14
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
15
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
16
reference_url https://usn.ubuntu.com/6031-1/
reference_id USN-6031-1
reference_type
scores
url https://usn.ubuntu.com/6031-1/
fixed_packages
aliases CVE-2023-1095
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5kt-n8qx-57dd
136
url VCID-qhc3-ffew-q7at
vulnerability_id VCID-qhc3-ffew-q7at
summary kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49536.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49536
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06014
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.0605
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16069
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18085
published_at 2026-04-24T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18288
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18291
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18244
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18193
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18137
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18149
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18175
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/03cbbd7c2f5ee288f648f4aeedc765a181188553
reference_id 03cbbd7c2f5ee288f648f4aeedc765a181188553
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/03cbbd7c2f5ee288f648f4aeedc765a181188553
5
reference_url https://git.kernel.org/stable/c/0c4eed901285b9cae36a622f32bea3e92490da6c
reference_id 0c4eed901285b9cae36a622f32bea3e92490da6c
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/0c4eed901285b9cae36a622f32bea3e92490da6c
6
reference_url https://git.kernel.org/stable/c/21c0d469349957b5dc811c41200a2a998996ca8d
reference_id 21c0d469349957b5dc811c41200a2a998996ca8d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/21c0d469349957b5dc811c41200a2a998996ca8d
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347847
reference_id 2347847
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347847
8
reference_url https://git.kernel.org/stable/c/7625e81de2164a082810e1f27547d388406da610
reference_id 7625e81de2164a082810e1f27547d388406da610
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:45Z/
url https://git.kernel.org/stable/c/7625e81de2164a082810e1f27547d388406da610
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49536
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhc3-ffew-q7at
137
url VCID-qmdw-hcza-cycq
vulnerability_id VCID-qmdw-hcza-cycq
summary kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1184
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.0628
published_at 2026-04-01T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06313
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06346
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06327
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06374
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06403
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06392
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.0649
published_at 2026-04-21T12:55:00Z
12
value 0.00024
scoring_system epss
scoring_elements 0.06503
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4037
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20421
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40307
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2070205
reference_id 2070205
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2070205
21
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
22
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
23
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
24
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
25
reference_url https://access.redhat.com/errata/RHSA-2024:1877
reference_id RHSA-2024:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1877
26
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
27
reference_url https://usn.ubuntu.com/6252-1/
reference_id USN-6252-1
reference_type
scores
url https://usn.ubuntu.com/6252-1/
28
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
29
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
30
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
31
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
32
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
33
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
fixed_packages
aliases CVE-2022-1184
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmdw-hcza-cycq
138
url VCID-r48g-c56n-sqdz
vulnerability_id VCID-r48g-c56n-sqdz
summary hw: cpu: Intel: information disclosure via local access
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28693.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28693
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13913
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13777
published_at 2026-04-24T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13688
published_at 2026-04-16T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13683
published_at 2026-04-18T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-21T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.1397
published_at 2026-04-04T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13773
published_at 2026-04-07T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13856
published_at 2026-04-08T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13907
published_at 2026-04-09T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13864
published_at 2026-04-11T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13828
published_at 2026-04-12T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.1378
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28693
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107465
reference_id 2107465
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107465
4
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html
reference_id intel-sa-00707.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T20:54:47Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00707.html
5
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
6
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
7
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
8
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
9
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
11
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
12
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
fixed_packages
aliases CVE-2022-28693
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r48g-c56n-sqdz
139
url VCID-rcv2-9tnc-dqbp
vulnerability_id VCID-rcv2-9tnc-dqbp
summary kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47657.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47657.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47657
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10646
published_at 2026-04-01T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16872
published_at 2026-04-24T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17058
published_at 2026-04-12T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16996
published_at 2026-04-13T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16933
published_at 2026-04-16T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16934
published_at 2026-04-18T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.1697
published_at 2026-04-21T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-08T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21784
published_at 2026-04-09T12:55:00Z
12
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47657
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348201
reference_id 2348201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348201
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47657
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcv2-9tnc-dqbp
140
url VCID-rg5z-v1z7-9ygz
vulnerability_id VCID-rg5z-v1z7-9ygz
summary kernel: erspan: do not assume transport header is always set
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49691.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49691
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16387
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1637
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16331
published_at 2026-04-12T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16263
published_at 2026-04-13T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16199
published_at 2026-04-16T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16218
published_at 2026-04-18T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16256
published_at 2026-04-21T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16147
published_at 2026-04-24T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16239
published_at 2026-04-07T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16324
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348166
reference_id 2348166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348166
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-49691
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg5z-v1z7-9ygz
141
url VCID-rj99-p8mt-pqg9
vulnerability_id VCID-rj99-p8mt-pqg9
summary kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50000.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50000
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04693
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04734
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04751
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04784
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04796
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04788
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04768
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15157
published_at 2026-04-24T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15058
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15068
published_at 2026-04-18T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15119
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50000
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373543
reference_id 2373543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373543
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:0101
reference_id RHSA-2023:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0101
7
reference_url https://access.redhat.com/errata/RHSA-2023:0512
reference_id RHSA-2023:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0512
8
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
9
reference_url https://access.redhat.com/errata/RHSA-2025:15660
reference_id RHSA-2025:15660
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15660
fixed_packages
aliases CVE-2022-50000
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj99-p8mt-pqg9
142
url VCID-rw9z-gey2-u7bh
vulnerability_id VCID-rw9z-gey2-u7bh
summary kernel: igb: fix a use-after-free issue in igb_clean_tx_ring
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49695.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49695
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25599
published_at 2026-04-24T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25665
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25736
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25784
published_at 2026-04-09T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25794
published_at 2026-04-11T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25753
published_at 2026-04-12T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25695
published_at 2026-04-13T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-16T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25679
published_at 2026-04-18T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25655
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49695
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347672
reference_id 2347672
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347672
5
reference_url https://git.kernel.org/stable/c/2af944210dc23d43d8208dafac4df7be7e3c168b
reference_id 2af944210dc23d43d8208dafac4df7be7e3c168b
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/2af944210dc23d43d8208dafac4df7be7e3c168b
6
reference_url https://git.kernel.org/stable/c/3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec
reference_id 3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/3f6a57ee8544ec3982f8a3cbcbf4aea7d47eb9ec
7
reference_url https://git.kernel.org/stable/c/68a0ed06dcd5d3ea732d011c0b83d66e4791f521
reference_id 68a0ed06dcd5d3ea732d011c0b83d66e4791f521
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/68a0ed06dcd5d3ea732d011c0b83d66e4791f521
8
reference_url https://git.kernel.org/stable/c/c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
reference_id c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:05Z/
url https://git.kernel.org/stable/c/c12a2c9b1b460ed72e6b3c33aac1ef51b0329b66
9
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
10
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49695
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw9z-gey2-u7bh
143
url VCID-rynn-q2u9-v7h1
vulnerability_id VCID-rynn-q2u9-v7h1
summary kernel: vsock: remove vsock from connected table when connect is interrupted by a signal
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48786.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48786
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00743
published_at 2026-04-02T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.0077
published_at 2026-04-24T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.0074
published_at 2026-04-04T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00745
published_at 2026-04-07T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00744
published_at 2026-04-08T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00736
published_at 2026-04-09T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00732
published_at 2026-04-11T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00726
published_at 2026-04-16T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.0073
published_at 2026-04-18T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00771
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48786
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/0bb88f3f7e8d506f3efe46d694964117e20efbfc
reference_id 0bb88f3f7e8d506f3efe46d694964117e20efbfc
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/0bb88f3f7e8d506f3efe46d694964117e20efbfc
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2298122
reference_id 2298122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2298122
6
reference_url https://git.kernel.org/stable/c/2910bcb9f67551a45397735e47b6d456eb8cd549
reference_id 2910bcb9f67551a45397735e47b6d456eb8cd549
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/2910bcb9f67551a45397735e47b6d456eb8cd549
7
reference_url https://git.kernel.org/stable/c/5f326fe2aef411a6575628f92bd861463ea91df7
reference_id 5f326fe2aef411a6575628f92bd861463ea91df7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/5f326fe2aef411a6575628f92bd861463ea91df7
8
reference_url https://git.kernel.org/stable/c/787468ee7a435777521d33399d012fd591ae2f94
reference_id 787468ee7a435777521d33399d012fd591ae2f94
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/787468ee7a435777521d33399d012fd591ae2f94
9
reference_url https://git.kernel.org/stable/c/87cd1bbd6677411e17369cd4b7389ab1e1fdba44
reference_id 87cd1bbd6677411e17369cd4b7389ab1e1fdba44
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/87cd1bbd6677411e17369cd4b7389ab1e1fdba44
10
reference_url https://git.kernel.org/stable/c/addd62a8cb6fa90aa322365c62487da61f6baab8
reference_id addd62a8cb6fa90aa322365c62487da61f6baab8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/addd62a8cb6fa90aa322365c62487da61f6baab8
11
reference_url https://git.kernel.org/stable/c/b9208492fcaecff8f43915529ae34b3bcb03877c
reference_id b9208492fcaecff8f43915529ae34b3bcb03877c
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/b9208492fcaecff8f43915529ae34b3bcb03877c
12
reference_url https://git.kernel.org/stable/c/e3b3939fd137aab6d00d54bee0ee9244b286a608
reference_id e3b3939fd137aab6d00d54bee0ee9244b286a608
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-10T16:59:52Z/
url https://git.kernel.org/stable/c/e3b3939fd137aab6d00d54bee0ee9244b286a608
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
15
reference_url https://access.redhat.com/errata/RHSA-2024:10273
reference_id RHSA-2024:10273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10273
16
reference_url https://access.redhat.com/errata/RHSA-2024:6990
reference_id RHSA-2024:6990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6990
17
reference_url https://access.redhat.com/errata/RHSA-2024:6991
reference_id RHSA-2024:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6991
fixed_packages
aliases CVE-2022-48786
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rynn-q2u9-v7h1
144
url VCID-s3jv-85uw-hugd
vulnerability_id VCID-s3jv-85uw-hugd
summary kernel: netfilter: nfnetlink_osf: uninitialized variable information disclosure vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42432.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42432
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22222
published_at 2026-04-04T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22174
published_at 2026-04-02T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23948
published_at 2026-04-08T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23881
published_at 2026-04-07T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23994
published_at 2026-04-09T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.24011
published_at 2026-04-11T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.23967
published_at 2026-04-12T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23911
published_at 2026-04-13T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26145
published_at 2026-04-24T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26279
published_at 2026-04-16T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26254
published_at 2026-04-18T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.2622
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42432
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220907082618.1193201-1-pablo%40netfilter.org/
reference_id 20220907082618.1193201-1-pablo%40netfilter.org
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T20:24:58Z/
url https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220907082618.1193201-1-pablo%40netfilter.org/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2182888
reference_id 2182888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2182888
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1457/
reference_id ZDI-22-1457
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T20:24:58Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1457/
fixed_packages
aliases CVE-2022-42432
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3jv-85uw-hugd
145
url VCID-s58d-5gm5-43ck
vulnerability_id VCID-s58d-5gm5-43ck
summary kernel: sfc: fix considering that all channels have TX queues
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49378.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49378
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20272
published_at 2026-04-09T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20297
published_at 2026-04-11T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20251
published_at 2026-04-12T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20192
published_at 2026-04-13T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20184
published_at 2026-04-16T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20188
published_at 2026-04-18T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20187
published_at 2026-04-21T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20065
published_at 2026-04-24T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20132
published_at 2026-04-07T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20213
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347679
reference_id 2347679
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347679
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49378
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s58d-5gm5-43ck
146
url VCID-sbya-z3j7-jbh3
vulnerability_id VCID-sbya-z3j7-jbh3
summary kernel: udmabuf: validate ubuf->pagecount
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47649.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47649.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47649
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01118
published_at 2026-04-11T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01112
published_at 2026-04-12T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.01114
published_at 2026-04-13T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10303
published_at 2026-04-01T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13568
published_at 2026-04-09T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13437
published_at 2026-04-07T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13519
published_at 2026-04-08T12:55:00Z
9
value 9e-05
scoring_system epss
scoring_elements 0.00897
published_at 2026-04-16T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00905
published_at 2026-04-18T12:55:00Z
11
value 9e-05
scoring_system epss
scoring_elements 0.00954
published_at 2026-04-21T12:55:00Z
12
value 9e-05
scoring_system epss
scoring_elements 0.00957
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47649
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47649
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47649
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348193
reference_id 2348193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348193
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47649
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbya-z3j7-jbh3
147
url VCID-sc7v-2hz2-cfde
vulnerability_id VCID-sc7v-2hz2-cfde
summary kernel: ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49268.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49268
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04924
published_at 2026-04-24T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04736
published_at 2026-04-16T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04746
published_at 2026-04-18T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.0489
published_at 2026-04-21T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04792
published_at 2026-04-07T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04836
published_at 2026-04-09T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04803
published_at 2026-04-12T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04783
published_at 2026-04-13T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49268
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348329
reference_id 2348329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348329
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49268
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sc7v-2hz2-cfde
148
url VCID-szgy-w5mr-gqcz
vulnerability_id VCID-szgy-w5mr-gqcz
summary kernel: bfq: Update cgroup information before merging bio
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49413.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49413.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49413
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10701
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10638
published_at 2026-04-02T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-24T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20288
published_at 2026-04-07T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20369
published_at 2026-04-08T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20427
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20456
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20411
published_at 2026-04-12T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20355
published_at 2026-04-13T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20345
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20346
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.20343
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49413
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49413
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347682
reference_id 2347682
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347682
5
reference_url https://git.kernel.org/stable/c/2a1077f17169a6059992a0bbdb330e0abad1e6d9
reference_id 2a1077f17169a6059992a0bbdb330e0abad1e6d9
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:22Z/
url https://git.kernel.org/stable/c/2a1077f17169a6059992a0bbdb330e0abad1e6d9
6
reference_url https://git.kernel.org/stable/c/b06691af08b41dfd81052a3362514d9827b44bb1
reference_id b06691af08b41dfd81052a3362514d9827b44bb1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:22Z/
url https://git.kernel.org/stable/c/b06691af08b41dfd81052a3362514d9827b44bb1
7
reference_url https://git.kernel.org/stable/c/d9165200c5627a2cf4408eefabdf0058bdf95e1a
reference_id d9165200c5627a2cf4408eefabdf0058bdf95e1a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:22Z/
url https://git.kernel.org/stable/c/d9165200c5627a2cf4408eefabdf0058bdf95e1a
8
reference_url https://git.kernel.org/stable/c/da9f3025d595956410ceaab2bea01980d7775948
reference_id da9f3025d595956410ceaab2bea01980d7775948
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:22Z/
url https://git.kernel.org/stable/c/da9f3025d595956410ceaab2bea01980d7775948
9
reference_url https://git.kernel.org/stable/c/e8821f45612f2e6d9adb9c6ba0fb4184f57692aa
reference_id e8821f45612f2e6d9adb9c6ba0fb4184f57692aa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:22Z/
url https://git.kernel.org/stable/c/e8821f45612f2e6d9adb9c6ba0fb4184f57692aa
10
reference_url https://git.kernel.org/stable/c/ea591cd4eb270393810e7be01feb8fde6a34fbbe
reference_id ea591cd4eb270393810e7be01feb8fde6a34fbbe
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:22Z/
url https://git.kernel.org/stable/c/ea591cd4eb270393810e7be01feb8fde6a34fbbe
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49413
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szgy-w5mr-gqcz
149
url VCID-szsu-zzs2-k7a2
vulnerability_id VCID-szsu-zzs2-k7a2
summary kernel: ath11k: Fix frames flush failure caused by deadlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49123.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49123
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06873
published_at 2026-04-04T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11115
published_at 2026-04-13T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10994
published_at 2026-04-18T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11138
published_at 2026-04-12T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.1098
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11486
published_at 2026-04-21T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17386
published_at 2026-04-11T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20538
published_at 2026-04-09T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.2048
published_at 2026-04-08T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20399
published_at 2026-04-07T12:55:00Z
11
value 8e-05
scoring_system epss
scoring_elements 0.0073
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49123
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348213
reference_id 2348213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348213
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49123
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szsu-zzs2-k7a2
150
url VCID-t5af-qk3e-qyfa
vulnerability_id VCID-t5af-qk3e-qyfa
summary kernel: off-path attacker may inject data or terminate victim's TCP session
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36516.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36516.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36516
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11899
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11814
published_at 2026-04-16T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.1181
published_at 2026-04-18T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11929
published_at 2026-04-21T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12129
published_at 2026-04-04T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12015
published_at 2026-04-08T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12067
published_at 2026-04-09T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12074
published_at 2026-04-11T12:55:00Z
8
value 0.0004
scoring_system epss
scoring_elements 0.12037
published_at 2026-04-12T12:55:00Z
9
value 0.0004
scoring_system epss
scoring_elements 0.12009
published_at 2026-04-13T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.1197
published_at 2026-04-01T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.11932
published_at 2026-04-07T12:55:00Z
12
value 0.0004
scoring_system epss
scoring_elements 0.12084
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36516
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2059928
reference_id 2059928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2059928
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:2674
reference_id RHSA-2024:2674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2674
10
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
11
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
12
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2020-36516
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5af-qk3e-qyfa
151
url VCID-t84j-7tyr-fkfy
vulnerability_id VCID-t84j-7tyr-fkfy
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
reference_id 2090226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
3
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
4
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
5
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
6
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
7
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
11
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
12
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
aliases CVE-2022-23816
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t84j-7tyr-fkfy
152
url VCID-t9n3-kkm8-vue2
vulnerability_id VCID-t9n3-kkm8-vue2
summary kernel: scsi: lpfc: Inhibit aborts if external loopback plug is inserted
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49504.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49504
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09313
published_at 2026-04-04T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09262
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.2181
published_at 2026-04-09T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.2182
published_at 2026-04-11T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-12T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21724
published_at 2026-04-16T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21731
published_at 2026-04-18T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21697
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.2155
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21675
published_at 2026-04-07T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21752
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49504
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49504
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347710
reference_id 2347710
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347710
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49504
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9n3-kkm8-vue2
153
url VCID-tbqr-e1t1-23cb
vulnerability_id VCID-tbqr-e1t1-23cb
summary kernel: x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49557.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49557.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49557
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.2376
published_at 2026-04-09T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23775
published_at 2026-04-11T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23731
published_at 2026-04-12T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23675
published_at 2026-04-13T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23687
published_at 2026-04-16T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23677
published_at 2026-04-18T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-21T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23544
published_at 2026-04-24T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23644
published_at 2026-04-07T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23713
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49557
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348183
reference_id 2348183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348183
4
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49557
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbqr-e1t1-23cb
154
url VCID-td6e-x2qb-syg3
vulnerability_id VCID-td6e-x2qb-syg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47421
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47447
published_at 2026-04-13T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47466
published_at 2026-04-11T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47443
published_at 2026-04-09T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47446
published_at 2026-04-08T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-12T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47391
published_at 2026-04-07T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67507
published_at 2026-04-24T12:55:00Z
8
value 0.00536
scoring_system epss
scoring_elements 0.67499
published_at 2026-04-16T12:55:00Z
9
value 0.00536
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-18T12:55:00Z
10
value 0.00536
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
reference_id 2090240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
49
reference_url http://xenbits.xen.org/xsa/advisory-404.html
reference_id advisory-404.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://xenbits.xen.org/xsa/advisory-404.html
50
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5173
51
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5178
52
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5184
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
54
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.gentoo.org/glsa/202208-23
55
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
56
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
57
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
58
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
59
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
60
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
61
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
62
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
63
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
64
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
65
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
66
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
67
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
68
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
69
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
70
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
72
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
73
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
74
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
75
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
aliases CVE-2022-21125
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3
155
url VCID-uf8f-sp1n-dfdf
vulnerability_id VCID-uf8f-sp1n-dfdf
summary kernel: ext4: fix memory leak in parse_apply_sb_mount_options()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49408.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49408
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17354
published_at 2026-04-04T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17305
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32719
published_at 2026-04-24T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32945
published_at 2026-04-09T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-11T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.3291
published_at 2026-04-12T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32885
published_at 2026-04-13T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32924
published_at 2026-04-16T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32903
published_at 2026-04-18T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32867
published_at 2026-04-21T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32869
published_at 2026-04-07T12:55:00Z
11
value 0.00133
scoring_system epss
scoring_elements 0.32916
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49408
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347761
reference_id 2347761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347761
4
reference_url https://git.kernel.org/stable/c/9ea3e6168948189cec31d0678d2b55b395f88491
reference_id 9ea3e6168948189cec31d0678d2b55b395f88491
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:49Z/
url https://git.kernel.org/stable/c/9ea3e6168948189cec31d0678d2b55b395f88491
5
reference_url https://git.kernel.org/stable/c/c069db76ed7b681c69159f44be96d2137e9ca989
reference_id c069db76ed7b681c69159f44be96d2137e9ca989
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:49Z/
url https://git.kernel.org/stable/c/c069db76ed7b681c69159f44be96d2137e9ca989
6
reference_url https://git.kernel.org/stable/c/f92ded66e9d0aa20b883a2a5183973abc8f41815
reference_id f92ded66e9d0aa20b883a2a5183973abc8f41815
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T20:08:49Z/
url https://git.kernel.org/stable/c/f92ded66e9d0aa20b883a2a5183973abc8f41815
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49408
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uf8f-sp1n-dfdf
156
url VCID-ugae-c268-37de
vulnerability_id VCID-ugae-c268-37de
summary kernel: ALSA: oss: Fix PCM OSS buffer allocation overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49292.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49292.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49292
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02594
published_at 2026-04-24T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02498
published_at 2026-04-16T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02503
published_at 2026-04-18T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02609
published_at 2026-04-21T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02519
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02544
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02524
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02513
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02512
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08186
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08241
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49292
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49292
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49292
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348302
reference_id 2348302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348302
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49292
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugae-c268-37de
157
url VCID-uste-4tg4-tbg2
vulnerability_id VCID-uste-4tg4-tbg2
summary kernel: PM: core: keep irq flags in device_pm_check_callbacks()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49175.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49175.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49175
reference_id
reference_type
scores
0
value 0.0001
scoring_system epss
scoring_elements 0.01236
published_at 2026-04-24T12:55:00Z
1
value 0.0001
scoring_system epss
scoring_elements 0.01162
published_at 2026-04-18T12:55:00Z
2
value 0.0001
scoring_system epss
scoring_elements 0.0115
published_at 2026-04-16T12:55:00Z
3
value 0.0001
scoring_system epss
scoring_elements 0.01232
published_at 2026-04-21T12:55:00Z
4
value 0.0001
scoring_system epss
scoring_elements 0.01173
published_at 2026-04-07T12:55:00Z
5
value 0.0001
scoring_system epss
scoring_elements 0.01179
published_at 2026-04-08T12:55:00Z
6
value 0.0001
scoring_system epss
scoring_elements 0.0118
published_at 2026-04-09T12:55:00Z
7
value 0.0001
scoring_system epss
scoring_elements 0.01166
published_at 2026-04-11T12:55:00Z
8
value 0.0001
scoring_system epss
scoring_elements 0.01158
published_at 2026-04-12T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16502
published_at 2026-04-02T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16563
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49175
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49175
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348314
reference_id 2348314
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348314
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49175
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uste-4tg4-tbg2
158
url VCID-uvqn-vktu-fkdt
vulnerability_id VCID-uvqn-vktu-fkdt
summary kernel: tipc: check attribute length for bearer name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49374.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49374
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18294
published_at 2026-04-24T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18377
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18459
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18511
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18512
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18464
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18413
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18357
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49374
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347724
reference_id 2347724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347724
5
reference_url https://git.kernel.org/stable/c/292be63c382ce20673ee61dff1ee9ed4a3dcaae7
reference_id 292be63c382ce20673ee61dff1ee9ed4a3dcaae7
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/292be63c382ce20673ee61dff1ee9ed4a3dcaae7
6
reference_url https://git.kernel.org/stable/c/3af15272cde28fe5c8489174b8624e232c1775ec
reference_id 3af15272cde28fe5c8489174b8624e232c1775ec
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/3af15272cde28fe5c8489174b8624e232c1775ec
7
reference_url https://git.kernel.org/stable/c/7f36f798f89bf32c0164049cb0e3fd1af613d0bb
reference_id 7f36f798f89bf32c0164049cb0e3fd1af613d0bb
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/7f36f798f89bf32c0164049cb0e3fd1af613d0bb
8
reference_url https://git.kernel.org/stable/c/8b91d0dfc839e67708c905648cd0e7507a2263e5
reference_id 8b91d0dfc839e67708c905648cd0e7507a2263e5
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/8b91d0dfc839e67708c905648cd0e7507a2263e5
9
reference_url https://git.kernel.org/stable/c/92a930fcf4250fe961f6238b99af0bc405799f39
reference_id 92a930fcf4250fe961f6238b99af0bc405799f39
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/92a930fcf4250fe961f6238b99af0bc405799f39
10
reference_url https://git.kernel.org/stable/c/b8fac8e321044a9ac50f7185b4e9d91a7745e4b0
reference_id b8fac8e321044a9ac50f7185b4e9d91a7745e4b0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/b8fac8e321044a9ac50f7185b4e9d91a7745e4b0
11
reference_url https://git.kernel.org/stable/c/f07670871f4d19e613740eebe210e7e9ea535973
reference_id f07670871f4d19e613740eebe210e7e9ea535973
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:42:07Z/
url https://git.kernel.org/stable/c/f07670871f4d19e613740eebe210e7e9ea535973
12
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
13
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49374
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uvqn-vktu-fkdt
159
url VCID-v7ex-q9pm-7kf3
vulnerability_id VCID-v7ex-q9pm-7kf3
summary kernel: netfilter: nft_tproxy: restrict to prerouting hook
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50001.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50001
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06259
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06275
published_at 2026-04-07T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06321
published_at 2026-04-08T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06361
published_at 2026-04-09T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06353
published_at 2026-04-11T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06298
published_at 2026-04-04T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06348
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06337
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-24T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-16T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-18T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50001
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373652
reference_id 2373652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373652
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-50001
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ex-q9pm-7kf3
160
url VCID-vqbz-4mev-mkhf
vulnerability_id VCID-vqbz-4mev-mkhf
summary kernel: tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49330.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49330.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49330
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07529
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07569
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16509
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16492
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16453
published_at 2026-04-12T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16392
published_at 2026-04-13T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16332
published_at 2026-04-16T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16353
published_at 2026-04-18T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16388
published_at 2026-04-21T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16282
published_at 2026-04-24T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16363
published_at 2026-04-07T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16449
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49330
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49330
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49330
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348206
reference_id 2348206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348206
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
fixed_packages
aliases CVE-2022-49330
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqbz-4mev-mkhf
161
url VCID-vrqx-rx44-97br
vulnerability_id VCID-vrqx-rx44-97br
summary kernel: block: null_blk: end timed out poll request
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49057.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49057.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49057
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06114
published_at 2026-04-11T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11337
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11394
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.1169
published_at 2026-04-24T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11744
published_at 2026-04-13T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11608
published_at 2026-04-16T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11606
published_at 2026-04-18T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11729
published_at 2026-04-21T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.1177
published_at 2026-04-12T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16098
published_at 2026-04-08T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.16161
published_at 2026-04-09T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.16011
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49057
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348326
reference_id 2348326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348326
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2024:4211
reference_id RHSA-2024:4211
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4211
fixed_packages
aliases CVE-2022-49057
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrqx-rx44-97br
162
url VCID-vt3m-r6xs-6yhn
vulnerability_id VCID-vt3m-r6xs-6yhn
summary kernel: ath9k: fix use-after-free in ath9k_hif_usb_rx_cb
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50179.json
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50179.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50179
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06508
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06498
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06488
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19811
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50179
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50179
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50179
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373551
reference_id 2373551
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373551
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2024:0412
reference_id RHSA-2024:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0412
fixed_packages
aliases CVE-2022-50179
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3m-r6xs-6yhn
163
url VCID-w6az-58av-47a8
vulnerability_id VCID-w6az-58av-47a8
summary kernel: drbd: only clone bio if we have a backing device
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50506.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50506
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04741
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04764
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04779
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-11T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04825
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.0479
published_at 2026-04-12T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.0477
published_at 2026-04-13T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04731
published_at 2026-04-18T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04875
published_at 2026-04-21T12:55:00Z
10
value 0.00018
scoring_system epss
scoring_elements 0.04912
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50506
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2401575
reference_id 2401575
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2401575
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-50506
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w6az-58av-47a8
164
url VCID-wdrm-2ct7-7bg5
vulnerability_id VCID-wdrm-2ct7-7bg5
summary kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3107.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3107
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02106
published_at 2026-04-02T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.02109
published_at 2026-04-08T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02113
published_at 2026-04-04T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02108
published_at 2026-04-07T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02127
published_at 2026-04-09T12:55:00Z
5
value 0.00013
scoring_system epss
scoring_elements 0.02104
published_at 2026-04-11T12:55:00Z
6
value 0.00013
scoring_system epss
scoring_elements 0.02089
published_at 2026-04-12T12:55:00Z
7
value 0.00013
scoring_system epss
scoring_elements 0.02084
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02443
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.0245
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02542
published_at 2026-04-24T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02555
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3107
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153060
reference_id 2153060
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:19:03Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2153060
5
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
reference_id ?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:19:03Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-3107
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdrm-2ct7-7bg5
165
url VCID-weps-sam3-6yhn
vulnerability_id VCID-weps-sam3-6yhn
summary kernel: bpf: Fix a btf decl_tag bug when tagging a function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49228.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49228
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06486
published_at 2026-04-24T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06311
published_at 2026-04-16T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06323
published_at 2026-04-18T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06472
published_at 2026-04-21T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06308
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06355
published_at 2026-04-08T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06395
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06388
published_at 2026-04-11T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06383
published_at 2026-04-12T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06372
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49228
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348300
reference_id 2348300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348300
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49228
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-weps-sam3-6yhn
166
url VCID-wgzq-sfgs-tuae
vulnerability_id VCID-wgzq-sfgs-tuae
summary kernel: ath11k: fix netdev open race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50187.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50187
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04629
published_at 2026-04-02T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04663
published_at 2026-04-04T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04676
published_at 2026-04-07T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.0471
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04723
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04716
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04699
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04682
published_at 2026-04-13T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14986
published_at 2026-04-24T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14886
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14893
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.14948
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373675
reference_id 2373675
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373675
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-50187
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgzq-sfgs-tuae
167
url VCID-wjwn-fu3r-nqf5
vulnerability_id VCID-wjwn-fu3r-nqf5
summary kernel: skbuff: fix coalescing for page_pool fragment recycling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49093.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49093.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49093
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13854
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13911
published_at 2026-04-04T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.29929
published_at 2026-04-24T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30049
published_at 2026-04-07T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30109
published_at 2026-04-08T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30144
published_at 2026-04-09T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30147
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30105
published_at 2026-04-12T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30056
published_at 2026-04-13T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30068
published_at 2026-04-16T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-18T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30001
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49093
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/1effe8ca4e34c34cdd9318436a4232dcb582ebf4
reference_id 1effe8ca4e34c34cdd9318436a4232dcb582ebf4
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:26Z/
url https://git.kernel.org/stable/c/1effe8ca4e34c34cdd9318436a4232dcb582ebf4
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347813
reference_id 2347813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347813
5
reference_url https://git.kernel.org/stable/c/72bb856d16e883437023ff2ff77d0c498018728a
reference_id 72bb856d16e883437023ff2ff77d0c498018728a
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:26Z/
url https://git.kernel.org/stable/c/72bb856d16e883437023ff2ff77d0c498018728a
6
reference_url https://git.kernel.org/stable/c/ba965e8605aee5387cecaa28fcf7ee9f61779a49
reference_id ba965e8605aee5387cecaa28fcf7ee9f61779a49
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:26Z/
url https://git.kernel.org/stable/c/ba965e8605aee5387cecaa28fcf7ee9f61779a49
7
reference_url https://git.kernel.org/stable/c/c4fa19615806a9a7e518c295b39175aa47a685ac
reference_id c4fa19615806a9a7e518c295b39175aa47a685ac
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:17:26Z/
url https://git.kernel.org/stable/c/c4fa19615806a9a7e518c295b39175aa47a685ac
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49093
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjwn-fu3r-nqf5
168
url VCID-wmj2-k6ca-yyet
vulnerability_id VCID-wmj2-k6ca-yyet
summary kernel: ath11k: mhi: use mhi_sync_power_up()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49130.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49130.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49130
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.22943
published_at 2026-04-24T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-12T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23148
published_at 2026-04-13T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23164
published_at 2026-04-16T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23156
published_at 2026-04-18T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23118
published_at 2026-04-21T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25756
published_at 2026-04-07T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25878
published_at 2026-04-09T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25827
published_at 2026-04-08T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28424
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49130
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49130
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/20d01a11efde2e05e47d5c66101f5c26eaca68e2
reference_id 20d01a11efde2e05e47d5c66101f5c26eaca68e2
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/20d01a11efde2e05e47d5c66101f5c26eaca68e2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348275
reference_id 2348275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348275
6
reference_url https://git.kernel.org/stable/c/339bd0b55ecdd0f7f341e9357c4cfde799de9418
reference_id 339bd0b55ecdd0f7f341e9357c4cfde799de9418
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/339bd0b55ecdd0f7f341e9357c4cfde799de9418
7
reference_url https://git.kernel.org/stable/c/3df6d74aedfdca919cca475d15dfdbc8b05c9e5d
reference_id 3df6d74aedfdca919cca475d15dfdbc8b05c9e5d
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/3df6d74aedfdca919cca475d15dfdbc8b05c9e5d
8
reference_url https://git.kernel.org/stable/c/3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849
reference_id 3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849
9
reference_url https://git.kernel.org/stable/c/646d533af2911be1184eaee8c900b7eb8ecc4396
reference_id 646d533af2911be1184eaee8c900b7eb8ecc4396
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:48:20Z/
url https://git.kernel.org/stable/c/646d533af2911be1184eaee8c900b7eb8ecc4396
10
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
11
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49130
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmj2-k6ca-yyet
169
url VCID-wtjw-5xm7-5ug6
vulnerability_id VCID-wtjw-5xm7-5ug6
summary kernel: loop: implement ->free_disk
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49531.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49531
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06873
published_at 2026-04-04T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0683
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17161
published_at 2026-04-24T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17336
published_at 2026-04-12T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17278
published_at 2026-04-13T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17217
published_at 2026-04-16T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17223
published_at 2026-04-18T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17256
published_at 2026-04-21T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17221
published_at 2026-04-07T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17314
published_at 2026-04-08T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17373
published_at 2026-04-09T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17386
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347714
reference_id 2347714
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347714
5
reference_url https://git.kernel.org/stable/c/aadd1443aae7fe8956e3b11157827067f034406a
reference_id aadd1443aae7fe8956e3b11157827067f034406a
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:55Z/
url https://git.kernel.org/stable/c/aadd1443aae7fe8956e3b11157827067f034406a
6
reference_url https://git.kernel.org/stable/c/d2c7f56f8b5256d57f9e3fc7794c31361d43bdd9
reference_id d2c7f56f8b5256d57f9e3fc7794c31361d43bdd9
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:37:55Z/
url https://git.kernel.org/stable/c/d2c7f56f8b5256d57f9e3fc7794c31361d43bdd9
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49531
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wtjw-5xm7-5ug6
170
url VCID-x6g1-brzn-wkfy
vulnerability_id VCID-x6g1-brzn-wkfy
summary kernel: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49107.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49107
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03981
published_at 2026-04-24T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03901
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03882
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.03857
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.03836
published_at 2026-04-16T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.03845
published_at 2026-04-18T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03965
published_at 2026-04-21T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16383
published_at 2026-04-02T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-04T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23096
published_at 2026-04-07T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.2317
published_at 2026-04-08T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23221
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49107
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347849
reference_id 2347849
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347849
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49107
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6g1-brzn-wkfy
171
url VCID-xbaa-2t96-w3dp
vulnerability_id VCID-xbaa-2t96-w3dp
summary kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49584.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49584
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07626
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07669
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19758
published_at 2026-04-09T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19762
published_at 2026-04-11T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19713
published_at 2026-04-12T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19656
published_at 2026-04-13T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19632
published_at 2026-04-16T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19634
published_at 2026-04-18T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19648
published_at 2026-04-21T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19539
published_at 2026-04-24T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19627
published_at 2026-04-07T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19707
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49584
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347764
reference_id 2347764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347764
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49584
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xbaa-2t96-w3dp
172
url VCID-xt2w-myh3-s7eu
vulnerability_id VCID-xt2w-myh3-s7eu
summary kernel: ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49515.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49515.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49515
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08793
published_at 2026-04-02T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08842
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33892
published_at 2026-04-09T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33891
published_at 2026-04-11T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33849
published_at 2026-04-12T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33824
published_at 2026-04-13T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33862
published_at 2026-04-16T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33847
published_at 2026-04-18T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33816
published_at 2026-04-21T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33454
published_at 2026-04-24T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33818
published_at 2026-04-07T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.3386
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49515
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347879
reference_id 2347879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347879
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49515
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xt2w-myh3-s7eu
173
url VCID-xv1q-1ump-cfgv
vulnerability_id VCID-xv1q-1ump-cfgv
summary kernel: bpf: Fix request_sock leak in sk lookup helpers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49697.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49697.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49697
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10351
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10417
published_at 2026-04-04T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33316
published_at 2026-04-09T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-11T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33278
published_at 2026-04-12T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33255
published_at 2026-04-13T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33294
published_at 2026-04-16T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33271
published_at 2026-04-18T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33235
published_at 2026-04-21T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33086
published_at 2026-04-24T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33238
published_at 2026-04-07T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33281
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49697
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49697
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347938
reference_id 2347938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347938
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49697
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xv1q-1ump-cfgv
174
url VCID-yec9-84hq-h3a9
vulnerability_id VCID-yec9-84hq-h3a9
summary kernel: scsi: qla2xxx: Fix warning message due to adisc being flushed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49158.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49158
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06838
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06886
published_at 2026-04-04T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17926
published_at 2026-04-09T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17942
published_at 2026-04-11T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17898
published_at 2026-04-12T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17849
published_at 2026-04-13T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17791
published_at 2026-04-16T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17801
published_at 2026-04-18T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17838
published_at 2026-04-21T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17746
published_at 2026-04-24T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17778
published_at 2026-04-07T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17866
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348055
reference_id 2348055
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348055
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49158
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yec9-84hq-h3a9
175
url VCID-yemh-xwuf-myaq
vulnerability_id VCID-yemh-xwuf-myaq
summary kernel: netfilter: nf_tables: do not allow SET_ID to refer to another table
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50213.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50213
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06385
published_at 2026-04-02T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06428
published_at 2026-04-04T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06416
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06466
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06508
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06505
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06498
published_at 2026-04-12T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06488
published_at 2026-04-13T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19811
published_at 2026-04-24T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19917
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19921
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373522
reference_id 2373522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373522
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
7
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
8
reference_url https://access.redhat.com/errata/RHSA-2024:3421
reference_id RHSA-2024:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3421
fixed_packages
aliases CVE-2022-50213
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yemh-xwuf-myaq
176
url VCID-ymdz-x8ab-kuat
vulnerability_id VCID-ymdz-x8ab-kuat
summary kernel: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49543.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49543
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11596
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.1165
published_at 2026-04-04T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26122
published_at 2026-04-09T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26132
published_at 2026-04-11T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26086
published_at 2026-04-12T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26027
published_at 2026-04-13T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26031
published_at 2026-04-16T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26008
published_at 2026-04-18T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25974
published_at 2026-04-21T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25913
published_at 2026-04-24T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26004
published_at 2026-04-07T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.2607
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348015
reference_id 2348015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348015
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49543
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ymdz-x8ab-kuat
177
url VCID-yqat-sxev-bfdt
vulnerability_id VCID-yqat-sxev-bfdt
summary kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20572.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-20572
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0232
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02389
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02402
published_at 2026-04-08T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02397
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02422
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02404
published_at 2026-04-11T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02394
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02393
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02377
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02399
published_at 2026-04-04T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.0287
published_at 2026-04-24T12:55:00Z
11
value 0.00015
scoring_system epss
scoring_elements 0.02762
published_at 2026-04-18T12:55:00Z
12
value 0.00015
scoring_system epss
scoring_elements 0.02874
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-20572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20572
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://source.android.com/security/bulletin/pixel/2022-12-01
reference_id 2022-12-01
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-18T14:54:56Z/
url https://source.android.com/security/bulletin/pixel/2022-12-01
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2186545
reference_id 2186545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2186545
6
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
7
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://usn.ubuntu.com/6001-1/
reference_id USN-6001-1
reference_type
scores
url https://usn.ubuntu.com/6001-1/
11
reference_url https://usn.ubuntu.com/6013-1/
reference_id USN-6013-1
reference_type
scores
url https://usn.ubuntu.com/6013-1/
12
reference_url https://usn.ubuntu.com/6014-1/
reference_id USN-6014-1
reference_type
scores
url https://usn.ubuntu.com/6014-1/
fixed_packages
aliases CVE-2022-20572
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqat-sxev-bfdt
178
url VCID-yst1-cukd-a3e5
vulnerability_id VCID-yst1-cukd-a3e5
summary kernel: Revert "Revert "block, bfq: honor already-setup queue merges""
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47646.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-47646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-47646
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02519
published_at 2026-04-07T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02544
published_at 2026-04-09T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-08T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03407
published_at 2026-04-24T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0371
published_at 2026-04-11T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03688
published_at 2026-04-12T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03662
published_at 2026-04-13T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03294
published_at 2026-04-16T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03305
published_at 2026-04-18T12:55:00Z
9
value 0.00016
scoring_system epss
scoring_elements 0.03421
published_at 2026-04-21T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15432
published_at 2026-04-02T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15391
published_at 2026-04-01T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15501
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-47646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47646
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/15729ff8143f8135b03988a100a19e66d7cb7ecd
reference_id 15729ff8143f8135b03988a100a19e66d7cb7ecd
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/15729ff8143f8135b03988a100a19e66d7cb7ecd
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348285
reference_id 2348285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348285
6
reference_url https://git.kernel.org/stable/c/4083925bd6dc89216d156474a8076feec904e607
reference_id 4083925bd6dc89216d156474a8076feec904e607
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/4083925bd6dc89216d156474a8076feec904e607
7
reference_url https://git.kernel.org/stable/c/65d8a737452e88f251fe5d925371de6d606df613
reference_id 65d8a737452e88f251fe5d925371de6d606df613
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/65d8a737452e88f251fe5d925371de6d606df613
8
reference_url https://git.kernel.org/stable/c/931aff627469a75c77b9fd3823146d0575afffd6
reference_id 931aff627469a75c77b9fd3823146d0575afffd6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/931aff627469a75c77b9fd3823146d0575afffd6
9
reference_url https://git.kernel.org/stable/c/abc2129e646af7b43025d90a071f83043f1ae76c
reference_id abc2129e646af7b43025d90a071f83043f1ae76c
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/abc2129e646af7b43025d90a071f83043f1ae76c
10
reference_url https://git.kernel.org/stable/c/cc051f497eac9d8a0d816cd4bffa3415f2724871
reference_id cc051f497eac9d8a0d816cd4bffa3415f2724871
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/cc051f497eac9d8a0d816cd4bffa3415f2724871
11
reference_url https://git.kernel.org/stable/c/f990f0985eda59d4f29fc83fcf300c92b1225d39
reference_id f990f0985eda59d4f29fc83fcf300c92b1225d39
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T17:59:39Z/
url https://git.kernel.org/stable/c/f990f0985eda59d4f29fc83fcf300c92b1225d39
12
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2021-47646
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yst1-cukd-a3e5
179
url VCID-yv2c-29cg-e3cp
vulnerability_id VCID-yv2c-29cg-e3cp
summary kernel: RDMA/irdma: Fix sleep from invalid context BUG
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49606.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49606
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06039
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06073
published_at 2026-04-04T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-09T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29561
published_at 2026-04-11T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29516
published_at 2026-04-12T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29464
published_at 2026-04-13T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29483
published_at 2026-04-16T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-18T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29409
published_at 2026-04-21T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29293
published_at 2026-04-24T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29456
published_at 2026-04-07T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49606
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348277
reference_id 2348277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348277
4
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49606
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yv2c-29cg-e3cp
180
url VCID-yvf9-x49e-vba9
vulnerability_id VCID-yvf9-x49e-vba9
summary kernel: sfc: fix use after free when disabling sriov
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49626.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49626.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49626
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03567
published_at 2026-04-24T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03559
published_at 2026-04-21T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10701
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10638
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18286
published_at 2026-04-16T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-13T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18393
published_at 2026-04-12T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.1844
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18441
published_at 2026-04-09T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18388
published_at 2026-04-08T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18305
published_at 2026-04-07T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18298
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49626
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49626
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49626
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348032
reference_id 2348032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348032
5
reference_url https://git.kernel.org/stable/c/3199e34912d84cdfb8a93a984c5ae5c73fb13e84
reference_id 3199e34912d84cdfb8a93a984c5ae5c73fb13e84
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/3199e34912d84cdfb8a93a984c5ae5c73fb13e84
6
reference_url https://git.kernel.org/stable/c/58d93e9d160c0de6d867c7eb4c2206671a351eb1
reference_id 58d93e9d160c0de6d867c7eb4c2206671a351eb1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/58d93e9d160c0de6d867c7eb4c2206671a351eb1
7
reference_url https://git.kernel.org/stable/c/9c854ae512b89229aeee93849e9bd4c115b37909
reference_id 9c854ae512b89229aeee93849e9bd4c115b37909
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/9c854ae512b89229aeee93849e9bd4c115b37909
8
reference_url https://git.kernel.org/stable/c/bcad880865bfb421885364b1f0c7351280fe2b97
reference_id bcad880865bfb421885364b1f0c7351280fe2b97
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/bcad880865bfb421885364b1f0c7351280fe2b97
9
reference_url https://git.kernel.org/stable/c/c2240500817b3b4b996cdf2a461a3a5679f49b94
reference_id c2240500817b3b4b996cdf2a461a3a5679f49b94
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/c2240500817b3b4b996cdf2a461a3a5679f49b94
10
reference_url https://git.kernel.org/stable/c/c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
reference_id c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/c9e75bb22a26e391f189f5a5133dd63dcb57fdaa
11
reference_url https://git.kernel.org/stable/c/e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
reference_id e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/e435c4aeeaa073091f7f3b7735af2ef5c97d63f2
12
reference_url https://git.kernel.org/stable/c/ebe41da5d47ac0fff877e57bd14c54dccf168827
reference_id ebe41da5d47ac0fff877e57bd14c54dccf168827
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:15:26Z/
url https://git.kernel.org/stable/c/ebe41da5d47ac0fff877e57bd14c54dccf168827
13
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
14
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49626
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvf9-x49e-vba9
181
url VCID-ywx7-11kj-vkaj
vulnerability_id VCID-ywx7-11kj-vkaj
summary kernel: mm/huge_memory: Fix xarray node memory leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49334.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49334
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08329
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08382
published_at 2026-04-04T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34664
published_at 2026-04-09T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34666
published_at 2026-04-11T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34627
published_at 2026-04-12T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34603
published_at 2026-04-13T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34642
published_at 2026-04-16T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34628
published_at 2026-04-18T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34589
published_at 2026-04-21T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34353
published_at 2026-04-24T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34592
published_at 2026-04-07T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49334
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347757
reference_id 2347757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347757
4
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49334
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ywx7-11kj-vkaj
182
url VCID-z2wn-6gpb-6bcu
vulnerability_id VCID-z2wn-6gpb-6bcu
summary kernel: dm: fix use-after-free in dm_cleanup_zoned_dev()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49270.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49270.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49270
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11313
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11373
published_at 2026-04-04T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35057
published_at 2026-04-24T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.353
published_at 2026-04-07T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.35346
published_at 2026-04-08T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35372
published_at 2026-04-09T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.35373
published_at 2026-04-11T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35336
published_at 2026-04-12T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35315
published_at 2026-04-13T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35354
published_at 2026-04-16T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35342
published_at 2026-04-18T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.3529
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49270
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://git.kernel.org/stable/c/0987f00a76a17aa7213da492c00ed9e5a6210c73
reference_id 0987f00a76a17aa7213da492c00ed9e5a6210c73
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:55Z/
url https://git.kernel.org/stable/c/0987f00a76a17aa7213da492c00ed9e5a6210c73
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348180
reference_id 2348180
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348180
5
reference_url https://git.kernel.org/stable/c/43a043aed964659bc69ef81f266912b73c80d837
reference_id 43a043aed964659bc69ef81f266912b73c80d837
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:55Z/
url https://git.kernel.org/stable/c/43a043aed964659bc69ef81f266912b73c80d837
6
reference_url https://git.kernel.org/stable/c/588b7f5df0cb64f281290c7672470c006abe7160
reference_id 588b7f5df0cb64f281290c7672470c006abe7160
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:55Z/
url https://git.kernel.org/stable/c/588b7f5df0cb64f281290c7672470c006abe7160
7
reference_url https://git.kernel.org/stable/c/fdfe414ca28ddfd562c233fb27385cf820de03e8
reference_id fdfe414ca28ddfd562c233fb27385cf820de03e8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-27T18:16:55Z/
url https://git.kernel.org/stable/c/fdfe414ca28ddfd562c233fb27385cf820de03e8
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2024:9942
reference_id RHSA-2024:9942
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9942
fixed_packages
aliases CVE-2022-49270
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z2wn-6gpb-6bcu
183
url VCID-z4we-1au6-gqh4
vulnerability_id VCID-z4we-1au6-gqh4
summary kernel: ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49272.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49272
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07706
published_at 2026-04-04T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07663
published_at 2026-04-02T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09411
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09424
published_at 2026-04-11T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09394
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0938
published_at 2026-04-13T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09271
published_at 2026-04-18T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09421
published_at 2026-04-21T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09476
published_at 2026-04-24T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09288
published_at 2026-04-07T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09364
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49272
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49272
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348064
reference_id 2348064
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348064
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49272
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4we-1au6-gqh4
184
url VCID-zasw-wwu3-xkaf
vulnerability_id VCID-zasw-wwu3-xkaf
summary kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2586.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2586.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2586
reference_id
reference_type
scores
0
value 0.02217
scoring_system epss
scoring_elements 0.84427
published_at 2026-04-02T12:55:00Z
1
value 0.02217
scoring_system epss
scoring_elements 0.84534
published_at 2026-04-24T12:55:00Z
2
value 0.02217
scoring_system epss
scoring_elements 0.84446
published_at 2026-04-04T12:55:00Z
3
value 0.02217
scoring_system epss
scoring_elements 0.84447
published_at 2026-04-07T12:55:00Z
4
value 0.02217
scoring_system epss
scoring_elements 0.84469
published_at 2026-04-08T12:55:00Z
5
value 0.02217
scoring_system epss
scoring_elements 0.84475
published_at 2026-04-09T12:55:00Z
6
value 0.02217
scoring_system epss
scoring_elements 0.84493
published_at 2026-04-11T12:55:00Z
7
value 0.02217
scoring_system epss
scoring_elements 0.84488
published_at 2026-04-12T12:55:00Z
8
value 0.02217
scoring_system epss
scoring_elements 0.84483
published_at 2026-04-13T12:55:00Z
9
value 0.02217
scoring_system epss
scoring_elements 0.84505
published_at 2026-04-18T12:55:00Z
10
value 0.02217
scoring_system epss
scoring_elements 0.84507
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2586
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114878
reference_id 2114878
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114878
12
reference_url https://www.openwall.com/lists/oss-security/2022/08/09/5
reference_id 5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://www.openwall.com/lists/oss-security/2022/08/09/5
13
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
14
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
15
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
16
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
17
reference_url https://access.redhat.com/errata/RHSA-2024:0724
reference_id RHSA-2024:0724
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0724
18
reference_url https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t
reference_id #t
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t
19
reference_url https://ubuntu.com/security/notices/USN-5557-1
reference_id USN-5557-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5557-1
20
reference_url https://usn.ubuntu.com/5557-1/
reference_id USN-5557-1
reference_type
scores
url https://usn.ubuntu.com/5557-1/
21
reference_url https://ubuntu.com/security/notices/USN-5560-1
reference_id USN-5560-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5560-1
22
reference_url https://usn.ubuntu.com/5560-1/
reference_id USN-5560-1
reference_type
scores
url https://usn.ubuntu.com/5560-1/
23
reference_url https://ubuntu.com/security/notices/USN-5560-2
reference_id USN-5560-2
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5560-2
24
reference_url https://usn.ubuntu.com/5560-2/
reference_id USN-5560-2
reference_type
scores
url https://usn.ubuntu.com/5560-2/
25
reference_url https://ubuntu.com/security/notices/USN-5562-1
reference_id USN-5562-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5562-1
26
reference_url https://usn.ubuntu.com/5562-1/
reference_id USN-5562-1
reference_type
scores
url https://usn.ubuntu.com/5562-1/
27
reference_url https://ubuntu.com/security/notices/USN-5564-1
reference_id USN-5564-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5564-1
28
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
29
reference_url https://ubuntu.com/security/notices/USN-5565-1
reference_id USN-5565-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5565-1
30
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
31
reference_url https://ubuntu.com/security/notices/USN-5566-1
reference_id USN-5566-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5566-1
32
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
33
reference_url https://ubuntu.com/security/notices/USN-5567-1
reference_id USN-5567-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5567-1
34
reference_url https://usn.ubuntu.com/5567-1/
reference_id USN-5567-1
reference_type
scores
url https://usn.ubuntu.com/5567-1/
35
reference_url https://ubuntu.com/security/notices/USN-5582-1
reference_id USN-5582-1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://ubuntu.com/security/notices/USN-5582-1
36
reference_url https://usn.ubuntu.com/5582-1/
reference_id USN-5582-1
reference_type
scores
url https://usn.ubuntu.com/5582-1/
37
reference_url https://www.zerodayinitiative.com/advisories/ZDI-22-1118/
reference_id ZDI-22-1118
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-06-26T15:34:35Z/
url https://www.zerodayinitiative.com/advisories/ZDI-22-1118/
fixed_packages
aliases CVE-2022-2586
risk_score 10.0
exploitability 2.0
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zasw-wwu3-xkaf
185
url VCID-zb92-vd24-8yhk
vulnerability_id VCID-zb92-vd24-8yhk
summary kernel: KVM: NULL pointer dereference in kvm_dirty_ring_push in virt/kvm/dirty_ring.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1263.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1263
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20916
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21067
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2112
published_at 2026-04-04T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20835
published_at 2026-04-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20915
published_at 2026-04-08T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20976
published_at 2026-04-09T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20993
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.2095
published_at 2026-04-12T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20896
published_at 2026-04-13T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20887
published_at 2026-04-16T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20888
published_at 2026-04-18T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.20868
published_at 2026-04-21T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.20739
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1263
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072698
reference_id 2072698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072698
4
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
7
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
8
reference_url https://usn.ubuntu.com/5469-1/
reference_id USN-5469-1
reference_type
scores
url https://usn.ubuntu.com/5469-1/
fixed_packages
aliases CVE-2022-1263
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zb92-vd24-8yhk
186
url VCID-zbse-sx7a-93ek
vulnerability_id VCID-zbse-sx7a-93ek
summary kernel: firmware: arm_scmi: Fix list protocols enumeration in the base protocol
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49451.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49451
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04951
published_at 2026-04-24T12:55:00Z
1
value 0.00018
scoring_system epss
scoring_elements 0.04823
published_at 2026-04-07T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.0486
published_at 2026-04-08T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04878
published_at 2026-04-09T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04855
published_at 2026-04-11T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04832
published_at 2026-04-12T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04812
published_at 2026-04-13T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.0476
published_at 2026-04-16T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04769
published_at 2026-04-18T12:55:00Z
9
value 0.00018
scoring_system epss
scoring_elements 0.04915
published_at 2026-04-21T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49451
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49451
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1052f22e127d0c34c3387bb389424ba1c61491ff
reference_id 1052f22e127d0c34c3387bb389424ba1c61491ff
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/1052f22e127d0c34c3387bb389424ba1c61491ff
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347940
reference_id 2347940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347940
6
reference_url https://git.kernel.org/stable/c/2ccfcd7a09c826516edcfe464b05071961aada3f
reference_id 2ccfcd7a09c826516edcfe464b05071961aada3f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/2ccfcd7a09c826516edcfe464b05071961aada3f
7
reference_url https://git.kernel.org/stable/c/444a2d27fe9867d0da4b28fc45b793f32e099ab8
reference_id 444a2d27fe9867d0da4b28fc45b793f32e099ab8
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/444a2d27fe9867d0da4b28fc45b793f32e099ab8
8
reference_url https://git.kernel.org/stable/c/6e7978695f4a6cbd83616b5a702b77fa2087b247
reference_id 6e7978695f4a6cbd83616b5a702b77fa2087b247
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/6e7978695f4a6cbd83616b5a702b77fa2087b247
9
reference_url https://git.kernel.org/stable/c/8009120e0354a67068e920eb10dce532391361d0
reference_id 8009120e0354a67068e920eb10dce532391361d0
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/8009120e0354a67068e920eb10dce532391361d0
10
reference_url https://git.kernel.org/stable/c/98342148a8cd242855d7e257f298c966c96dba9f
reference_id 98342148a8cd242855d7e257f298c966c96dba9f
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/98342148a8cd242855d7e257f298c966c96dba9f
11
reference_url https://git.kernel.org/stable/c/b0e4bafac8963c2d85ee18d3d01f393735acceec
reference_id b0e4bafac8963c2d85ee18d3d01f393735acceec
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T19:40:29Z/
url https://git.kernel.org/stable/c/b0e4bafac8963c2d85ee18d3d01f393735acceec
12
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
13
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
fixed_packages
aliases CVE-2022-49451
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbse-sx7a-93ek
187
url VCID-zkyv-h5at-xkgq
vulnerability_id VCID-zkyv-h5at-xkgq
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23825
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.3369
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33723
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33561
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33605
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33638
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33633
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33591
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33569
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33602
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33578
published_at 2026-04-18T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33546
published_at 2026-04-21T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33387
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23825
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103153
reference_id 2103153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103153
12
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
13
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
14
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
15
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
16
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
17
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
18
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
19
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
20
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
21
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
aliases CVE-2022-23825, XSA-407
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq
188
url VCID-zr5e-e394-1fb4
vulnerability_id VCID-zr5e-e394-1fb4
summary kernel: openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2639
reference_id
reference_type
scores
0
value 0.01101
scoring_system epss
scoring_elements 0.78005
published_at 2026-04-02T12:55:00Z
1
value 0.01101
scoring_system epss
scoring_elements 0.78035
published_at 2026-04-04T12:55:00Z
2
value 0.01101
scoring_system epss
scoring_elements 0.78018
published_at 2026-04-07T12:55:00Z
3
value 0.01101
scoring_system epss
scoring_elements 0.78044
published_at 2026-04-08T12:55:00Z
4
value 0.01101
scoring_system epss
scoring_elements 0.78049
published_at 2026-04-09T12:55:00Z
5
value 0.01101
scoring_system epss
scoring_elements 0.78075
published_at 2026-04-11T12:55:00Z
6
value 0.01101
scoring_system epss
scoring_elements 0.78057
published_at 2026-04-12T12:55:00Z
7
value 0.01101
scoring_system epss
scoring_elements 0.78054
published_at 2026-04-13T12:55:00Z
8
value 0.01101
scoring_system epss
scoring_elements 0.78089
published_at 2026-04-16T12:55:00Z
9
value 0.01101
scoring_system epss
scoring_elements 0.78088
published_at 2026-04-18T12:55:00Z
10
value 0.01101
scoring_system epss
scoring_elements 0.78081
published_at 2026-04-21T12:55:00Z
11
value 0.01101
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2639
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2084479
reference_id 2084479
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2084479
5
reference_url https://access.redhat.com/errata/RHSA-2022:7444
reference_id RHSA-2022:7444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7444
6
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
7
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
8
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
9
reference_url https://access.redhat.com/errata/RHSA-2022:8765
reference_id RHSA-2022:8765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8765
10
reference_url https://access.redhat.com/errata/RHSA-2022:8767
reference_id RHSA-2022:8767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8767
11
reference_url https://access.redhat.com/errata/RHSA-2022:8768
reference_id RHSA-2022:8768
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8768
12
reference_url https://access.redhat.com/errata/RHSA-2022:8809
reference_id RHSA-2022:8809
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8809
13
reference_url https://access.redhat.com/errata/RHSA-2022:8831
reference_id RHSA-2022:8831
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8831
14
reference_url https://access.redhat.com/errata/RHSA-2022:8940
reference_id RHSA-2022:8940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8940
15
reference_url https://access.redhat.com/errata/RHSA-2022:8941
reference_id RHSA-2022:8941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8941
16
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
17
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
18
reference_url https://access.redhat.com/errata/RHSA-2022:8989
reference_id RHSA-2022:8989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8989
19
reference_url https://access.redhat.com/errata/RHSA-2022:9082
reference_id RHSA-2022:9082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9082
20
reference_url https://access.redhat.com/errata/RHSA-2023:0058
reference_id RHSA-2023:0058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0058
21
reference_url https://access.redhat.com/errata/RHSA-2023:0059
reference_id RHSA-2023:0059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0059
22
reference_url https://usn.ubuntu.com/5650-1/
reference_id USN-5650-1
reference_type
scores
url https://usn.ubuntu.com/5650-1/
fixed_packages
aliases CVE-2022-2639
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5e-e394-1fb4
189
url VCID-zrjz-h3jk-wuan
vulnerability_id VCID-zrjz-h3jk-wuan
summary kernel: brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49263.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49263
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10422
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.1049
published_at 2026-04-04T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16387
published_at 2026-04-09T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.1637
published_at 2026-04-11T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16331
published_at 2026-04-12T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16263
published_at 2026-04-13T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16199
published_at 2026-04-16T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16218
published_at 2026-04-18T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16256
published_at 2026-04-21T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16147
published_at 2026-04-24T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16239
published_at 2026-04-07T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16324
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49263
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49263
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348286
reference_id 2348286
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348286
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49263
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrjz-h3jk-wuan
190
url VCID-zuxk-225d-n7au
vulnerability_id VCID-zuxk-225d-n7au
summary kernel: LSM: general protection fault in legacy_parse_param
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49180.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49180.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49180
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15123
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15192
published_at 2026-04-04T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.1735
published_at 2026-04-09T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17363
published_at 2026-04-11T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17313
published_at 2026-04-12T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17256
published_at 2026-04-13T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17195
published_at 2026-04-16T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17201
published_at 2026-04-18T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17234
published_at 2026-04-21T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17139
published_at 2026-04-24T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.172
published_at 2026-04-07T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17292
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49180
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49180
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49180
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348229
reference_id 2348229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348229
5
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
6
reference_url https://access.redhat.com/errata/RHSA-2023:7077
reference_id RHSA-2023:7077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7077
fixed_packages
aliases CVE-2022-49180
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zuxk-225d-n7au
191
url VCID-zymq-kwzh-2kfh
vulnerability_id VCID-zymq-kwzh-2kfh
summary kernel: tipc: move bc link creation back to tipc_node_create
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49664.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-49664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-49664
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-02T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32945
published_at 2026-04-09T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32948
published_at 2026-04-11T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.3291
published_at 2026-04-12T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32885
published_at 2026-04-13T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32924
published_at 2026-04-16T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32903
published_at 2026-04-18T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32867
published_at 2026-04-21T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32719
published_at 2026-04-24T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32869
published_at 2026-04-07T12:55:00Z
11
value 0.00133
scoring_system epss
scoring_elements 0.32916
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-49664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2348070
reference_id 2348070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2348070
5
reference_url https://access.redhat.com/errata/RHSA-2022:7683
reference_id RHSA-2022:7683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7683
6
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
fixed_packages
aliases CVE-2022-49664
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zymq-kwzh-2kfh
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-162.6.1%3Farch=el9_1