Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/kernel@5.14.0-70.151.1?arch=el9_0
Typerpm
Namespaceredhat
Namekernel
Version5.14.0-70.151.1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2b58-6k8p-tqhs
vulnerability_id VCID-2b58-6k8p-tqhs
summary kernel: net: usb: smsc75xx: Limit packet length to skb->len
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53125.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53125
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19772
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19824
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19546
published_at 2026-04-07T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19626
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19679
published_at 2026-04-09T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19683
published_at 2026-04-11T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19634
published_at 2026-04-12T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-13T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19553
published_at 2026-04-16T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.1956
published_at 2026-04-18T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-21T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19468
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53125
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2363686
reference_id 2363686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2363686
5
reference_url https://access.redhat.com/errata/RHSA-2025:15785
reference_id RHSA-2025:15785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15785
6
reference_url https://access.redhat.com/errata/RHSA-2025:16398
reference_id RHSA-2025:16398
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16398
7
reference_url https://access.redhat.com/errata/RHSA-2025:17109
reference_id RHSA-2025:17109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17109
8
reference_url https://access.redhat.com/errata/RHSA-2025:17161
reference_id RHSA-2025:17161
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17161
9
reference_url https://access.redhat.com/errata/RHSA-2025:17958
reference_id RHSA-2025:17958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17958
10
reference_url https://access.redhat.com/errata/RHSA-2025:18279
reference_id RHSA-2025:18279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18279
11
reference_url https://access.redhat.com/errata/RHSA-2025:18280
reference_id RHSA-2025:18280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18280
12
reference_url https://access.redhat.com/errata/RHSA-2025:18932
reference_id RHSA-2025:18932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18932
13
reference_url https://access.redhat.com/errata/RHSA-2025:19222
reference_id RHSA-2025:19222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19222
14
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
15
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
16
reference_url https://access.redhat.com/errata/RHSA-2025:21667
reference_id RHSA-2025:21667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21667
17
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
fixed_packages
aliases CVE-2023-53125
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b58-6k8p-tqhs
1
url VCID-35qx-tq4e-63as
vulnerability_id VCID-35qx-tq4e-63as
summary kernel: Linux kernel ALSA hda/ca0132 buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39751.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-39751.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2394624
reference_id 2394624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2394624
3
reference_url https://access.redhat.com/errata/RHSA-2025:18297
reference_id RHSA-2025:18297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18297
4
reference_url https://access.redhat.com/errata/RHSA-2025:18298
reference_id RHSA-2025:18298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18298
5
reference_url https://access.redhat.com/errata/RHSA-2025:18932
reference_id RHSA-2025:18932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18932
6
reference_url https://access.redhat.com/errata/RHSA-2025:19104
reference_id RHSA-2025:19104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19104
7
reference_url https://access.redhat.com/errata/RHSA-2025:19105
reference_id RHSA-2025:19105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19105
8
reference_url https://access.redhat.com/errata/RHSA-2025:19106
reference_id RHSA-2025:19106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19106
9
reference_url https://access.redhat.com/errata/RHSA-2025:19222
reference_id RHSA-2025:19222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19222
10
reference_url https://access.redhat.com/errata/RHSA-2025:19223
reference_id RHSA-2025:19223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19223
11
reference_url https://access.redhat.com/errata/RHSA-2025:19224
reference_id RHSA-2025:19224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19224
12
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
13
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
14
reference_url https://access.redhat.com/errata/RHSA-2025:21063
reference_id RHSA-2025:21063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21063
15
reference_url https://access.redhat.com/errata/RHSA-2025:21082
reference_id RHSA-2025:21082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21082
16
reference_url https://access.redhat.com/errata/RHSA-2025:21118
reference_id RHSA-2025:21118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21118
17
reference_url https://access.redhat.com/errata/RHSA-2025:21667
reference_id RHSA-2025:21667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21667
18
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
fixed_packages
aliases CVE-2025-39751
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35qx-tq4e-63as
2
url VCID-7rac-1wnt-fqh7
vulnerability_id VCID-7rac-1wnt-fqh7
summary kernel: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50228.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50228
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05957
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05998
published_at 2026-04-04T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05983
published_at 2026-04-07T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06023
published_at 2026-04-08T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.0606
published_at 2026-04-09T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.0605
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06042
published_at 2026-04-12T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06034
published_at 2026-04-13T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18614
published_at 2026-04-24T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18696
published_at 2026-04-16T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18709
published_at 2026-04-18T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18727
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373529
reference_id 2373529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373529
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2025:17797
reference_id RHSA-2025:17797
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17797
7
reference_url https://access.redhat.com/errata/RHSA-2025:17812
reference_id RHSA-2025:17812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17812
8
reference_url https://access.redhat.com/errata/RHSA-2025:18932
reference_id RHSA-2025:18932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18932
9
reference_url https://access.redhat.com/errata/RHSA-2025:19222
reference_id RHSA-2025:19222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19222
10
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
11
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
12
reference_url https://access.redhat.com/errata/RHSA-2025:21667
reference_id RHSA-2025:21667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21667
13
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
fixed_packages
aliases CVE-2022-50228
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rac-1wnt-fqh7
3
url VCID-8dxv-djg3-5khb
vulnerability_id VCID-8dxv-djg3-5khb
summary kernel: crypto: seqiv - Handle EBUSY correctly
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53373.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-53373
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03107
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.0307
published_at 2026-04-13T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03083
published_at 2026-04-12T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03109
published_at 2026-04-11T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.0315
published_at 2026-04-09T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.0312
published_at 2026-04-07T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03125
published_at 2026-04-08T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04303
published_at 2026-04-24T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04156
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04164
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.0429
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-53373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53373
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14
reference_id 1effbddaff60eeef8017c6dea1ee0ed970164d14
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2396379
reference_id 2396379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2396379
6
reference_url https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc
reference_id 32e62025e5e52fbe4812ef044759de7010b15dbc
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc
7
reference_url https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620
reference_id 36ec108b7bd7e280edb22de028467bd09d644620
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620
8
reference_url https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771
reference_id 4d497e8b200a175094e0ac252ed878add39b8771
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771
9
reference_url https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16
reference_id 63551e4b7cbcd9914258827699eb2cb6ed6e4a16
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16
10
reference_url https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36
reference_id 9477db935eb690f697d9bcc4f608927841bc8b36
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36
11
reference_url https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971
reference_id ae849d2f48019ff9c104e32bf588ccbfb200e971
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971
12
reference_url https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719
reference_id cc4d0d4251748a8a68026938f4055d2ac47c5719
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-14T18:54:09Z/
url https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719
13
reference_url https://access.redhat.com/errata/RHSA-2025:17760
reference_id RHSA-2025:17760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17760
14
reference_url https://access.redhat.com/errata/RHSA-2025:18297
reference_id RHSA-2025:18297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18297
15
reference_url https://access.redhat.com/errata/RHSA-2025:18298
reference_id RHSA-2025:18298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18298
16
reference_url https://access.redhat.com/errata/RHSA-2025:19104
reference_id RHSA-2025:19104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19104
17
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
18
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
19
reference_url https://access.redhat.com/errata/RHSA-2025:21051
reference_id RHSA-2025:21051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21051
20
reference_url https://access.redhat.com/errata/RHSA-2025:21063
reference_id RHSA-2025:21063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21063
21
reference_url https://access.redhat.com/errata/RHSA-2025:21082
reference_id RHSA-2025:21082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21082
22
reference_url https://access.redhat.com/errata/RHSA-2025:21083
reference_id RHSA-2025:21083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21083
23
reference_url https://access.redhat.com/errata/RHSA-2025:21084
reference_id RHSA-2025:21084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21084
24
reference_url https://access.redhat.com/errata/RHSA-2025:21112
reference_id RHSA-2025:21112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21112
25
reference_url https://access.redhat.com/errata/RHSA-2025:21128
reference_id RHSA-2025:21128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21128
26
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
27
reference_url https://access.redhat.com/errata/RHSA-2025:23445
reference_id RHSA-2025:23445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23445
fixed_packages
aliases CVE-2023-53373
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8dxv-djg3-5khb
4
url VCID-a1fy-tmwd-c3d5
vulnerability_id VCID-a1fy-tmwd-c3d5
summary kernel: RDMA/irdma: Fix a window for use-after-free
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50137.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50137
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06814
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06879
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06864
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06919
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06949
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.06948
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.06941
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.06937
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20563
published_at 2026-04-24T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20688
published_at 2026-04-16T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20684
published_at 2026-04-18T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20675
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50137
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373514
reference_id 2373514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373514
4
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
5
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
6
reference_url https://access.redhat.com/errata/RHSA-2025:19222
reference_id RHSA-2025:19222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19222
7
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
8
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
fixed_packages
aliases CVE-2022-50137
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a1fy-tmwd-c3d5
5
url VCID-a9b9-28jw-23cj
vulnerability_id VCID-a9b9-28jw-23cj
summary kernel: tls: separate no-async decryption request handling from async
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-58240.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-58240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-58240
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04033
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04051
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04066
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04071
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.0409
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04073
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04062
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04036
published_at 2026-04-13T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04025
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04037
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04159
published_at 2026-04-21T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04171
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-58240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2391431
reference_id 2391431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2391431
5
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
6
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
7
reference_url https://access.redhat.com/errata/RHSA-2025:21667
reference_id RHSA-2025:21667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21667
8
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
fixed_packages
aliases CVE-2024-58240
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b9-28jw-23cj
6
url VCID-czy7-c6h9-aub4
vulnerability_id VCID-czy7-c6h9-aub4
summary kernel: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50050.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50050.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50050
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05095
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05137
published_at 2026-04-04T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05159
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05192
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05209
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05181
published_at 2026-04-11T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-12T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05151
published_at 2026-04-13T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16059
published_at 2026-04-24T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16114
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16132
published_at 2026-04-18T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1617
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50050
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50050
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50050
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373423
reference_id 2373423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373423
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
8
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
9
reference_url https://access.redhat.com/errata/RHSA-2025:21084
reference_id RHSA-2025:21084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21084
10
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
fixed_packages
aliases CVE-2022-50050
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-czy7-c6h9-aub4
7
url VCID-q8pu-ntg5-myfj
vulnerability_id VCID-q8pu-ntg5-myfj
summary kernel: HID: core: Harden s32ton() against conversion to 0 bits
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38556.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38556.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-38556
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.03967
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.03983
published_at 2026-04-04T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.03995
published_at 2026-04-07T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04002
published_at 2026-04-08T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04019
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.0399
published_at 2026-04-11T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.03974
published_at 2026-04-12T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.03944
published_at 2026-04-13T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.03925
published_at 2026-04-16T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.03937
published_at 2026-04-18T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04059
published_at 2026-04-21T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04254
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-38556
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2389456
reference_id 2389456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2389456
5
reference_url https://access.redhat.com/errata/RHSA-2025:16372
reference_id RHSA-2025:16372
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:16372
6
reference_url https://access.redhat.com/errata/RHSA-2025:17760
reference_id RHSA-2025:17760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17760
7
reference_url https://access.redhat.com/errata/RHSA-2025:17776
reference_id RHSA-2025:17776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17776
8
reference_url https://access.redhat.com/errata/RHSA-2025:18932
reference_id RHSA-2025:18932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18932
9
reference_url https://access.redhat.com/errata/RHSA-2025:19104
reference_id RHSA-2025:19104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19104
10
reference_url https://access.redhat.com/errata/RHSA-2025:19222
reference_id RHSA-2025:19222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19222
11
reference_url https://access.redhat.com/errata/RHSA-2025:19223
reference_id RHSA-2025:19223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19223
12
reference_url https://access.redhat.com/errata/RHSA-2025:19224
reference_id RHSA-2025:19224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19224
13
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
14
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
15
reference_url https://access.redhat.com/errata/RHSA-2025:21063
reference_id RHSA-2025:21063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21063
16
reference_url https://access.redhat.com/errata/RHSA-2025:21082
reference_id RHSA-2025:21082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21082
17
reference_url https://access.redhat.com/errata/RHSA-2025:21667
reference_id RHSA-2025:21667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21667
18
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
19
reference_url https://usn.ubuntu.com/7879-1/
reference_id USN-7879-1
reference_type
scores
url https://usn.ubuntu.com/7879-1/
20
reference_url https://usn.ubuntu.com/7879-2/
reference_id USN-7879-2
reference_type
scores
url https://usn.ubuntu.com/7879-2/
21
reference_url https://usn.ubuntu.com/7879-3/
reference_id USN-7879-3
reference_type
scores
url https://usn.ubuntu.com/7879-3/
22
reference_url https://usn.ubuntu.com/7879-4/
reference_id USN-7879-4
reference_type
scores
url https://usn.ubuntu.com/7879-4/
23
reference_url https://usn.ubuntu.com/7880-1/
reference_id USN-7880-1
reference_type
scores
url https://usn.ubuntu.com/7880-1/
24
reference_url https://usn.ubuntu.com/7934-1/
reference_id USN-7934-1
reference_type
scores
url https://usn.ubuntu.com/7934-1/
25
reference_url https://usn.ubuntu.com/8095-1/
reference_id USN-8095-1
reference_type
scores
url https://usn.ubuntu.com/8095-1/
26
reference_url https://usn.ubuntu.com/8095-2/
reference_id USN-8095-2
reference_type
scores
url https://usn.ubuntu.com/8095-2/
27
reference_url https://usn.ubuntu.com/8095-3/
reference_id USN-8095-3
reference_type
scores
url https://usn.ubuntu.com/8095-3/
28
reference_url https://usn.ubuntu.com/8095-4/
reference_id USN-8095-4
reference_type
scores
url https://usn.ubuntu.com/8095-4/
29
reference_url https://usn.ubuntu.com/8095-5/
reference_id USN-8095-5
reference_type
scores
url https://usn.ubuntu.com/8095-5/
30
reference_url https://usn.ubuntu.com/8096-1/
reference_id USN-8096-1
reference_type
scores
url https://usn.ubuntu.com/8096-1/
31
reference_url https://usn.ubuntu.com/8096-2/
reference_id USN-8096-2
reference_type
scores
url https://usn.ubuntu.com/8096-2/
32
reference_url https://usn.ubuntu.com/8096-3/
reference_id USN-8096-3
reference_type
scores
url https://usn.ubuntu.com/8096-3/
33
reference_url https://usn.ubuntu.com/8096-4/
reference_id USN-8096-4
reference_type
scores
url https://usn.ubuntu.com/8096-4/
34
reference_url https://usn.ubuntu.com/8096-5/
reference_id USN-8096-5
reference_type
scores
url https://usn.ubuntu.com/8096-5/
35
reference_url https://usn.ubuntu.com/8100-1/
reference_id USN-8100-1
reference_type
scores
url https://usn.ubuntu.com/8100-1/
36
reference_url https://usn.ubuntu.com/8116-1/
reference_id USN-8116-1
reference_type
scores
url https://usn.ubuntu.com/8116-1/
37
reference_url https://usn.ubuntu.com/8125-1/
reference_id USN-8125-1
reference_type
scores
url https://usn.ubuntu.com/8125-1/
38
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
39
reference_url https://usn.ubuntu.com/8141-1/
reference_id USN-8141-1
reference_type
scores
url https://usn.ubuntu.com/8141-1/
40
reference_url https://usn.ubuntu.com/8163-1/
reference_id USN-8163-1
reference_type
scores
url https://usn.ubuntu.com/8163-1/
41
reference_url https://usn.ubuntu.com/8163-2/
reference_id USN-8163-2
reference_type
scores
url https://usn.ubuntu.com/8163-2/
42
reference_url https://usn.ubuntu.com/8165-1/
reference_id USN-8165-1
reference_type
scores
url https://usn.ubuntu.com/8165-1/
fixed_packages
aliases CVE-2025-38556
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8pu-ntg5-myfj
8
url VCID-wkju-5p5k-z3g1
vulnerability_id VCID-wkju-5p5k-z3g1
summary kernel: mptcp: do not queue data on closed subflows
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50070.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-50070
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05095
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05137
published_at 2026-04-04T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05159
published_at 2026-04-07T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05192
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05209
published_at 2026-04-09T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05181
published_at 2026-04-11T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-12T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05151
published_at 2026-04-13T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16059
published_at 2026-04-24T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16114
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16132
published_at 2026-04-18T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.1617
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-50070
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50070
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373435
reference_id 2373435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2373435
5
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
6
reference_url https://access.redhat.com/errata/RHSA-2023:2951
reference_id RHSA-2023:2951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2951
7
reference_url https://access.redhat.com/errata/RHSA-2025:19222
reference_id RHSA-2025:19222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19222
8
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
9
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
10
reference_url https://access.redhat.com/errata/RHSA-2025:22752
reference_id RHSA-2025:22752
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22752
11
reference_url https://usn.ubuntu.com/7909-1/
reference_id USN-7909-1
reference_type
scores
url https://usn.ubuntu.com/7909-1/
12
reference_url https://usn.ubuntu.com/7909-2/
reference_id USN-7909-2
reference_type
scores
url https://usn.ubuntu.com/7909-2/
13
reference_url https://usn.ubuntu.com/7909-3/
reference_id USN-7909-3
reference_type
scores
url https://usn.ubuntu.com/7909-3/
14
reference_url https://usn.ubuntu.com/7909-4/
reference_id USN-7909-4
reference_type
scores
url https://usn.ubuntu.com/7909-4/
15
reference_url https://usn.ubuntu.com/7909-5/
reference_id USN-7909-5
reference_type
scores
url https://usn.ubuntu.com/7909-5/
16
reference_url https://usn.ubuntu.com/7910-1/
reference_id USN-7910-1
reference_type
scores
url https://usn.ubuntu.com/7910-1/
17
reference_url https://usn.ubuntu.com/7910-2/
reference_id USN-7910-2
reference_type
scores
url https://usn.ubuntu.com/7910-2/
18
reference_url https://usn.ubuntu.com/7933-1/
reference_id USN-7933-1
reference_type
scores
url https://usn.ubuntu.com/7933-1/
19
reference_url https://usn.ubuntu.com/7938-1/
reference_id USN-7938-1
reference_type
scores
url https://usn.ubuntu.com/7938-1/
fixed_packages
aliases CVE-2022-50070
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkju-5p5k-z3g1
9
url VCID-x114-q3j2-aqf5
vulnerability_id VCID-x114-q3j2-aqf5
summary kernel: eventpoll: Fix semi-unbounded recursion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38614.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-38614.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-38614
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07104
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07153
published_at 2026-04-04T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07129
published_at 2026-04-07T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07182
published_at 2026-04-08T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07213
published_at 2026-04-09T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07211
published_at 2026-04-11T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.072
published_at 2026-04-12T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.0719
published_at 2026-04-13T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07127
published_at 2026-04-16T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07105
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07231
published_at 2026-04-21T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07346
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-38614
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2389491
reference_id 2389491
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2389491
5
reference_url https://access.redhat.com/errata/RHSA-2025:17760
reference_id RHSA-2025:17760
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17760
6
reference_url https://access.redhat.com/errata/RHSA-2025:18318
reference_id RHSA-2025:18318
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18318
7
reference_url https://access.redhat.com/errata/RHSA-2025:19104
reference_id RHSA-2025:19104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19104
8
reference_url https://access.redhat.com/errata/RHSA-2025:19268
reference_id RHSA-2025:19268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19268
9
reference_url https://access.redhat.com/errata/RHSA-2025:19492
reference_id RHSA-2025:19492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19492
10
reference_url https://access.redhat.com/errata/RHSA-2025:21051
reference_id RHSA-2025:21051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21051
11
reference_url https://access.redhat.com/errata/RHSA-2025:21128
reference_id RHSA-2025:21128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21128
12
reference_url https://access.redhat.com/errata/RHSA-2025:21463
reference_id RHSA-2025:21463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21463
13
reference_url https://usn.ubuntu.com/7909-1/
reference_id USN-7909-1
reference_type
scores
url https://usn.ubuntu.com/7909-1/
14
reference_url https://usn.ubuntu.com/7909-2/
reference_id USN-7909-2
reference_type
scores
url https://usn.ubuntu.com/7909-2/
15
reference_url https://usn.ubuntu.com/7909-3/
reference_id USN-7909-3
reference_type
scores
url https://usn.ubuntu.com/7909-3/
16
reference_url https://usn.ubuntu.com/7909-4/
reference_id USN-7909-4
reference_type
scores
url https://usn.ubuntu.com/7909-4/
17
reference_url https://usn.ubuntu.com/7909-5/
reference_id USN-7909-5
reference_type
scores
url https://usn.ubuntu.com/7909-5/
18
reference_url https://usn.ubuntu.com/7910-1/
reference_id USN-7910-1
reference_type
scores
url https://usn.ubuntu.com/7910-1/
19
reference_url https://usn.ubuntu.com/7910-2/
reference_id USN-7910-2
reference_type
scores
url https://usn.ubuntu.com/7910-2/
20
reference_url https://usn.ubuntu.com/7933-1/
reference_id USN-7933-1
reference_type
scores
url https://usn.ubuntu.com/7933-1/
21
reference_url https://usn.ubuntu.com/7938-1/
reference_id USN-7938-1
reference_type
scores
url https://usn.ubuntu.com/7938-1/
22
reference_url https://usn.ubuntu.com/8028-1/
reference_id USN-8028-1
reference_type
scores
url https://usn.ubuntu.com/8028-1/
23
reference_url https://usn.ubuntu.com/8028-2/
reference_id USN-8028-2
reference_type
scores
url https://usn.ubuntu.com/8028-2/
24
reference_url https://usn.ubuntu.com/8028-3/
reference_id USN-8028-3
reference_type
scores
url https://usn.ubuntu.com/8028-3/
25
reference_url https://usn.ubuntu.com/8028-4/
reference_id USN-8028-4
reference_type
scores
url https://usn.ubuntu.com/8028-4/
26
reference_url https://usn.ubuntu.com/8028-5/
reference_id USN-8028-5
reference_type
scores
url https://usn.ubuntu.com/8028-5/
27
reference_url https://usn.ubuntu.com/8028-6/
reference_id USN-8028-6
reference_type
scores
url https://usn.ubuntu.com/8028-6/
28
reference_url https://usn.ubuntu.com/8028-7/
reference_id USN-8028-7
reference_type
scores
url https://usn.ubuntu.com/8028-7/
29
reference_url https://usn.ubuntu.com/8028-8/
reference_id USN-8028-8
reference_type
scores
url https://usn.ubuntu.com/8028-8/
30
reference_url https://usn.ubuntu.com/8031-1/
reference_id USN-8031-1
reference_type
scores
url https://usn.ubuntu.com/8031-1/
31
reference_url https://usn.ubuntu.com/8031-2/
reference_id USN-8031-2
reference_type
scores
url https://usn.ubuntu.com/8031-2/
32
reference_url https://usn.ubuntu.com/8031-3/
reference_id USN-8031-3
reference_type
scores
url https://usn.ubuntu.com/8031-3/
33
reference_url https://usn.ubuntu.com/8052-1/
reference_id USN-8052-1
reference_type
scores
url https://usn.ubuntu.com/8052-1/
34
reference_url https://usn.ubuntu.com/8052-2/
reference_id USN-8052-2
reference_type
scores
url https://usn.ubuntu.com/8052-2/
35
reference_url https://usn.ubuntu.com/8074-1/
reference_id USN-8074-1
reference_type
scores
url https://usn.ubuntu.com/8074-1/
36
reference_url https://usn.ubuntu.com/8074-2/
reference_id USN-8074-2
reference_type
scores
url https://usn.ubuntu.com/8074-2/
37
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
fixed_packages
aliases CVE-2025-38614
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x114-q3j2-aqf5
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.151.1%3Farch=el9_0